ws-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From cohei...@apache.org
Subject svn commit: r1754091 [33/39] - in /webservices/website/wss4j: ./ apidocs/ apidocs/org/apache/wss4j/binding/wss10/ apidocs/org/apache/wss4j/binding/wss10/class-use/ apidocs/org/apache/wss4j/binding/wss11/ apidocs/org/apache/wss4j/binding/wss11/class-use...
Date Tue, 26 Jul 2016 09:18:04 GMT
Modified: webservices/website/wss4j/xref-test/org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html
URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref-test/org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html?rev=1754091&r1=1754090&r2=1754091&view=diff
==============================================================================
--- webservices/website/wss4j/xref-test/org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html (original)
+++ webservices/website/wss4j/xref-test/org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html Tue Jul 26 09:17:42 2016
@@ -37,435 +37,435 @@
 <a class="jxr_linenumber" name="L29" href="#L29">29</a>  <strong class="jxr_keyword">import</strong> java.util.Properties;
 <a class="jxr_linenumber" name="L30" href="#L30">30</a>  
 <a class="jxr_linenumber" name="L31" href="#L31">31</a>  <strong class="jxr_keyword">import</strong> javax.xml.stream.XMLStreamException;
-<a class="jxr_linenumber" name="L32" href="#L32">32</a>  <strong class="jxr_keyword">import</strong> javax.xml.stream.XMLStreamReader;
-<a class="jxr_linenumber" name="L33" href="#L33">33</a>  <strong class="jxr_keyword">import</strong> javax.xml.transform.dom.DOMSource;
-<a class="jxr_linenumber" name="L34" href="#L34">34</a>  <strong class="jxr_keyword">import</strong> javax.xml.transform.stream.StreamResult;
-<a class="jxr_linenumber" name="L35" href="#L35">35</a>  <strong class="jxr_keyword">import</strong> javax.xml.xpath.XPathConstants;
-<a class="jxr_linenumber" name="L36" href="#L36">36</a>  <strong class="jxr_keyword">import</strong> javax.xml.xpath.XPathExpression;
-<a class="jxr_linenumber" name="L37" href="#L37">37</a>  
-<a class="jxr_linenumber" name="L38" href="#L38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.compress.compressors.xz.XZCompressorInputStream;
-<a class="jxr_linenumber" name="L39" href="#L39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.compress.compressors.xz.XZCompressorOutputStream;
-<a class="jxr_linenumber" name="L40" href="#L40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.bsp.BSPRule;
-<a class="jxr_linenumber" name="L41" href="#L41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.ext.WSSecurityException;
-<a class="jxr_linenumber" name="L42" href="#L42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.dom.handler.WSHandlerConstants;
-<a class="jxr_linenumber" name="L43" href="#L43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.ext.WSSConstants;
-<a class="jxr_linenumber" name="L44" href="#L44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.ext.WSSSecurityProperties;
-<a class="jxr_linenumber" name="L45" href="#L45">45</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.setup.InboundWSSec;
-<a class="jxr_linenumber" name="L46" href="#L46">46</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.setup.WSSec;
-<a class="jxr_linenumber" name="L47" href="#L47">47</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.test.utils.StAX2DOM;
-<a class="jxr_linenumber" name="L48" href="#L48">48</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.stax.config.Init;
-<a class="jxr_linenumber" name="L49" href="#L49">49</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.stax.config.TransformerAlgorithmMapper;
-<a class="jxr_linenumber" name="L50" href="#L50">50</a>  <strong class="jxr_keyword">import</strong> org.junit.Assert;
-<a class="jxr_linenumber" name="L51" href="#L51">51</a>  <strong class="jxr_keyword">import</strong> org.junit.Test;
-<a class="jxr_linenumber" name="L52" href="#L52">52</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Attr;
-<a class="jxr_linenumber" name="L53" href="#L53">53</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
-<a class="jxr_linenumber" name="L54" href="#L54">54</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
-<a class="jxr_linenumber" name="L55" href="#L55">55</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.NodeList;
-<a class="jxr_linenumber" name="L56" href="#L56">56</a>  
-<a class="jxr_linenumber" name="L57" href="#L57">57</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html">VulnerabliltyVectorsTest</a> <strong class="jxr_keyword">extends</strong> <a href="../../../../../org/apache/wss4j/stax/test/AbstractTestBase.html">AbstractTestBase</a> {
-<a class="jxr_linenumber" name="L58" href="#L58">58</a>  
-<a class="jxr_linenumber" name="L59" href="#L59">59</a>      <em class="jxr_javadoccomment">/**</em>
-<a class="jxr_linenumber" name="L60" href="#L60">60</a>  <em class="jxr_javadoccomment">     * Tests if the framework is vulnerable to recursive key references</em>
-<a class="jxr_linenumber" name="L61" href="#L61">61</a>  <em class="jxr_javadoccomment">     *</em>
-<a class="jxr_linenumber" name="L62" href="#L62">62</a>  <em class="jxr_javadoccomment">     * @throws Exception</em>
-<a class="jxr_linenumber" name="L63" href="#L63">63</a>  <em class="jxr_javadoccomment">     */</em>
-<a class="jxr_linenumber" name="L64" href="#L64">64</a>      @Test
-<a class="jxr_linenumber" name="L65" href="#L65">65</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testRecursiveKeyReferencesDOS() <strong class="jxr_keyword">throws</strong> Exception {
-<a class="jxr_linenumber" name="L66" href="#L66">66</a>          InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
-<a class="jxr_linenumber" name="L67" href="#L67">67</a>  
-<a class="jxr_linenumber" name="L68" href="#L68">68</a>          String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
-<a class="jxr_linenumber" name="L69" href="#L69">69</a>          Properties properties = <strong class="jxr_keyword">new</strong> Properties();
-<a class="jxr_linenumber" name="L70" href="#L70">70</a>          properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
-<a class="jxr_linenumber" name="L71" href="#L71">71</a>          Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
-<a class="jxr_linenumber" name="L72" href="#L72">72</a>  
-<a class="jxr_linenumber" name="L73" href="#L73">73</a>          XPathExpression xPathExpression = getXPath(<span class="jxr_string">"/soap:Envelope/soap:Header/wsse:Security/xenc:EncryptedKey"</span>);
-<a class="jxr_linenumber" name="L74" href="#L74">74</a>          Element encryptedKeyElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);
-<a class="jxr_linenumber" name="L75" href="#L75">75</a>          encryptedKeyElement.removeAttribute(<span class="jxr_string">"Id"</span>);
-<a class="jxr_linenumber" name="L76" href="#L76">76</a>          encryptedKeyElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <span class="jxr_string">"G2"</span>);
-<a class="jxr_linenumber" name="L77" href="#L77">77</a>  
-<a class="jxr_linenumber" name="L78" href="#L78">78</a>          xPathExpression = getXPath(<span class="jxr_string">".//dsig:X509Data"</span>);
-<a class="jxr_linenumber" name="L79" href="#L79">79</a>          Element keyIdentifierElement = (Element) xPathExpression.evaluate(encryptedKeyElement, XPathConstants.NODE);
-<a class="jxr_linenumber" name="L80" href="#L80">80</a>          Element securityTokenReferenceElement = (Element) keyIdentifierElement.getParentNode();
-<a class="jxr_linenumber" name="L81" href="#L81">81</a>          securityTokenReferenceElement.removeChild(keyIdentifierElement);
-<a class="jxr_linenumber" name="L82" href="#L82">82</a>          <em class="jxr_comment">//wsse:Reference xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" URI="#EncKeyId-1483925398"/&gt;</em>
-<a class="jxr_linenumber" name="L83" href="#L83">83</a>          Element referenceElement = securedDocument.createElementNS(WSSConstants.TAG_WSSE_REFERENCE.getNamespaceURI(), WSSConstants.TAG_WSSE_REFERENCE.getLocalPart());
-<a class="jxr_linenumber" name="L84" href="#L84">84</a>          referenceElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"URI"</span>, <span class="jxr_string">"#G1"</span>);
-<a class="jxr_linenumber" name="L85" href="#L85">85</a>          securityTokenReferenceElement.appendChild(referenceElement);
-<a class="jxr_linenumber" name="L86" href="#L86">86</a>  
-<a class="jxr_linenumber" name="L87" href="#L87">87</a>          Element clonedEncryptedElement = (Element) encryptedKeyElement.cloneNode(<strong class="jxr_keyword">true</strong>);
-<a class="jxr_linenumber" name="L88" href="#L88">88</a>          clonedEncryptedElement.removeAttribute(<span class="jxr_string">"Id"</span>);
-<a class="jxr_linenumber" name="L89" href="#L89">89</a>          clonedEncryptedElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <span class="jxr_string">"G1"</span>);
-<a class="jxr_linenumber" name="L90" href="#L90">90</a>  
-<a class="jxr_linenumber" name="L91" href="#L91">91</a>          xPathExpression = getXPath(<span class="jxr_string">".//wsse:Reference"</span>);
-<a class="jxr_linenumber" name="L92" href="#L92">92</a>          Element newReferenceElement = (Element) xPathExpression.evaluate(clonedEncryptedElement, XPathConstants.NODE);
-<a class="jxr_linenumber" name="L93" href="#L93">93</a>          newReferenceElement.removeAttribute(<span class="jxr_string">"URI"</span>);
-<a class="jxr_linenumber" name="L94" href="#L94">94</a>          newReferenceElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"URI"</span>, <span class="jxr_string">"#G2"</span>);
+<a class="jxr_linenumber" name="L32" href="#L32">32</a>  <strong class="jxr_keyword">import</strong> javax.xml.transform.dom.DOMSource;
+<a class="jxr_linenumber" name="L33" href="#L33">33</a>  <strong class="jxr_keyword">import</strong> javax.xml.transform.stream.StreamResult;
+<a class="jxr_linenumber" name="L34" href="#L34">34</a>  <strong class="jxr_keyword">import</strong> javax.xml.xpath.XPathConstants;
+<a class="jxr_linenumber" name="L35" href="#L35">35</a>  <strong class="jxr_keyword">import</strong> javax.xml.xpath.XPathExpression;
+<a class="jxr_linenumber" name="L36" href="#L36">36</a>  
+<a class="jxr_linenumber" name="L37" href="#L37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.compress.compressors.xz.XZCompressorInputStream;
+<a class="jxr_linenumber" name="L38" href="#L38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.compress.compressors.xz.XZCompressorOutputStream;
+<a class="jxr_linenumber" name="L39" href="#L39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.bsp.BSPRule;
+<a class="jxr_linenumber" name="L40" href="#L40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.ext.WSSecurityException;
+<a class="jxr_linenumber" name="L41" href="#L41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.dom.handler.WSHandlerConstants;
+<a class="jxr_linenumber" name="L42" href="#L42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.ext.WSSConstants;
+<a class="jxr_linenumber" name="L43" href="#L43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.ext.WSSSecurityProperties;
+<a class="jxr_linenumber" name="L44" href="#L44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.wss4j.stax.setup.WSSec;
+<a class="jxr_linenumber" name="L45" href="#L45">45</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.stax.config.Init;
+<a class="jxr_linenumber" name="L46" href="#L46">46</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.stax.config.TransformerAlgorithmMapper;
+<a class="jxr_linenumber" name="L47" href="#L47">47</a>  <strong class="jxr_keyword">import</strong> org.junit.Assert;
+<a class="jxr_linenumber" name="L48" href="#L48">48</a>  <strong class="jxr_keyword">import</strong> org.junit.Test;
+<a class="jxr_linenumber" name="L49" href="#L49">49</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Attr;
+<a class="jxr_linenumber" name="L50" href="#L50">50</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a class="jxr_linenumber" name="L51" href="#L51">51</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a class="jxr_linenumber" name="L52" href="#L52">52</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.NodeList;
+<a class="jxr_linenumber" name="L53" href="#L53">53</a>  
+<a class="jxr_linenumber" name="L54" href="#L54">54</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/wss4j/stax/test/VulnerabliltyVectorsTest.html">VulnerabliltyVectorsTest</a> <strong class="jxr_keyword">extends</strong> <a href="../../../../../org/apache/wss4j/stax/test/AbstractTestBase.html">AbstractTestBase</a> {
+<a class="jxr_linenumber" name="L55" href="#L55">55</a>  
+<a class="jxr_linenumber" name="L56" href="#L56">56</a>      <em class="jxr_javadoccomment">/**</em>
+<a class="jxr_linenumber" name="L57" href="#L57">57</a>  <em class="jxr_javadoccomment">     * Tests if the framework is vulnerable to recursive key references</em>
+<a class="jxr_linenumber" name="L58" href="#L58">58</a>  <em class="jxr_javadoccomment">     *</em>
+<a class="jxr_linenumber" name="L59" href="#L59">59</a>  <em class="jxr_javadoccomment">     * @throws Exception</em>
+<a class="jxr_linenumber" name="L60" href="#L60">60</a>  <em class="jxr_javadoccomment">     */</em>
+<a class="jxr_linenumber" name="L61" href="#L61">61</a>      @Test
+<a class="jxr_linenumber" name="L62" href="#L62">62</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testRecursiveKeyReferencesDOS() <strong class="jxr_keyword">throws</strong> Exception {
+<a class="jxr_linenumber" name="L63" href="#L63">63</a>          InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
+<a class="jxr_linenumber" name="L64" href="#L64">64</a>  
+<a class="jxr_linenumber" name="L65" href="#L65">65</a>          String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
+<a class="jxr_linenumber" name="L66" href="#L66">66</a>          Properties properties = <strong class="jxr_keyword">new</strong> Properties();
+<a class="jxr_linenumber" name="L67" href="#L67">67</a>          properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
+<a class="jxr_linenumber" name="L68" href="#L68">68</a>          Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
+<a class="jxr_linenumber" name="L69" href="#L69">69</a>  
+<a class="jxr_linenumber" name="L70" href="#L70">70</a>          XPathExpression xPathExpression = getXPath(<span class="jxr_string">"/soap:Envelope/soap:Header/wsse:Security/xenc:EncryptedKey"</span>);
+<a class="jxr_linenumber" name="L71" href="#L71">71</a>          Element encryptedKeyElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);
+<a class="jxr_linenumber" name="L72" href="#L72">72</a>          encryptedKeyElement.removeAttribute(<span class="jxr_string">"Id"</span>);
+<a class="jxr_linenumber" name="L73" href="#L73">73</a>          encryptedKeyElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <span class="jxr_string">"G2"</span>);
+<a class="jxr_linenumber" name="L74" href="#L74">74</a>  
+<a class="jxr_linenumber" name="L75" href="#L75">75</a>          xPathExpression = getXPath(<span class="jxr_string">".//dsig:X509Data"</span>);
+<a class="jxr_linenumber" name="L76" href="#L76">76</a>          Element keyIdentifierElement = (Element) xPathExpression.evaluate(encryptedKeyElement, XPathConstants.NODE);
+<a class="jxr_linenumber" name="L77" href="#L77">77</a>          Element securityTokenReferenceElement = (Element) keyIdentifierElement.getParentNode();
+<a class="jxr_linenumber" name="L78" href="#L78">78</a>          securityTokenReferenceElement.removeChild(keyIdentifierElement);
+<a class="jxr_linenumber" name="L79" href="#L79">79</a>          <em class="jxr_comment">//wsse:Reference xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" URI="#EncKeyId-1483925398"/&gt;</em>
+<a class="jxr_linenumber" name="L80" href="#L80">80</a>          Element referenceElement = securedDocument.createElementNS(WSSConstants.TAG_WSSE_REFERENCE.getNamespaceURI(), WSSConstants.TAG_WSSE_REFERENCE.getLocalPart());
+<a class="jxr_linenumber" name="L81" href="#L81">81</a>          referenceElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"URI"</span>, <span class="jxr_string">"#G1"</span>);
+<a class="jxr_linenumber" name="L82" href="#L82">82</a>          securityTokenReferenceElement.appendChild(referenceElement);
+<a class="jxr_linenumber" name="L83" href="#L83">83</a>  
+<a class="jxr_linenumber" name="L84" href="#L84">84</a>          Element clonedEncryptedElement = (Element) encryptedKeyElement.cloneNode(<strong class="jxr_keyword">true</strong>);
+<a class="jxr_linenumber" name="L85" href="#L85">85</a>          clonedEncryptedElement.removeAttribute(<span class="jxr_string">"Id"</span>);
+<a class="jxr_linenumber" name="L86" href="#L86">86</a>          clonedEncryptedElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <span class="jxr_string">"G1"</span>);
+<a class="jxr_linenumber" name="L87" href="#L87">87</a>  
+<a class="jxr_linenumber" name="L88" href="#L88">88</a>          xPathExpression = getXPath(<span class="jxr_string">".//wsse:Reference"</span>);
+<a class="jxr_linenumber" name="L89" href="#L89">89</a>          Element newReferenceElement = (Element) xPathExpression.evaluate(clonedEncryptedElement, XPathConstants.NODE);
+<a class="jxr_linenumber" name="L90" href="#L90">90</a>          newReferenceElement.removeAttribute(<span class="jxr_string">"URI"</span>);
+<a class="jxr_linenumber" name="L91" href="#L91">91</a>          newReferenceElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"URI"</span>, <span class="jxr_string">"#G2"</span>);
+<a class="jxr_linenumber" name="L92" href="#L92">92</a>  
+<a class="jxr_linenumber" name="L93" href="#L93">93</a>          Element securityHeaderNode = (Element) encryptedKeyElement.getParentNode();
+<a class="jxr_linenumber" name="L94" href="#L94">94</a>          securityHeaderNode.insertBefore(clonedEncryptedElement, encryptedKeyElement);
 <a class="jxr_linenumber" name="L95" href="#L95">95</a>  
-<a class="jxr_linenumber" name="L96" href="#L96">96</a>          Element securityHeaderNode = (Element) encryptedKeyElement.getParentNode();
-<a class="jxr_linenumber" name="L97" href="#L97">97</a>          securityHeaderNode.insertBefore(clonedEncryptedElement, encryptedKeyElement);
-<a class="jxr_linenumber" name="L98" href="#L98">98</a>  
-<a class="jxr_linenumber" name="L99" href="#L99">99</a>          ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
+<a class="jxr_linenumber" name="L96" href="#L96">96</a>          ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
+<a class="jxr_linenumber" name="L97" href="#L97">97</a>  
+<a class="jxr_linenumber" name="L98" href="#L98">98</a>          javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
+<a class="jxr_linenumber" name="L99" href="#L99">99</a>          transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
 <a class="jxr_linenumber" name="L100" href="#L100">100</a> 
-<a class="jxr_linenumber" name="L101" href="#L101">101</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
-<a class="jxr_linenumber" name="L102" href="#L102">102</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
-<a class="jxr_linenumber" name="L103" href="#L103">103</a> 
-<a class="jxr_linenumber" name="L104" href="#L104">104</a>         WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
-<a class="jxr_linenumber" name="L105" href="#L105">105</a>         securityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
-<a class="jxr_linenumber" name="L106" href="#L106">106</a>         securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L107" href="#L107">107</a>         securityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L108" href="#L108">108</a> 
-<a class="jxr_linenumber" name="L109" href="#L109">109</a>         <strong class="jxr_keyword">try</strong> {
-<a class="jxr_linenumber" name="L110" href="#L110">110</a>             doInboundSecurity(securityProperties, xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
-<a class="jxr_linenumber" name="L111" href="#L111">111</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
-<a class="jxr_linenumber" name="L112" href="#L112">112</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
-<a class="jxr_linenumber" name="L113" href="#L113">113</a>             Throwable throwable = e.getCause();
-<a class="jxr_linenumber" name="L114" href="#L114">114</a>             Assert.assertNotNull(throwable);
-<a class="jxr_linenumber" name="L115" href="#L115">115</a>             <em class="jxr_comment">//we expect a "No SecurityToken found" since WSS says that a token must be declared before use.</em>
-<a class="jxr_linenumber" name="L116" href="#L116">116</a>             <em class="jxr_comment">//the declare before use is in the nature of streaming xml-security and therefore expected</em>
-<a class="jxr_linenumber" name="L117" href="#L117">117</a>             <em class="jxr_comment">//Assert.assertEquals(throwable.getMessage(), "An invalid security token was provided");</em>
-<a class="jxr_linenumber" name="L118" href="#L118">118</a>             Assert.assertEquals(throwable.getMessage(), <span class="jxr_string">"Recursive key reference detected."</span>);
-<a class="jxr_linenumber" name="L119" href="#L119">119</a>         }
-<a class="jxr_linenumber" name="L120" href="#L120">120</a>     }
-<a class="jxr_linenumber" name="L121" href="#L121">121</a> 
-<a class="jxr_linenumber" name="L122" href="#L122">122</a>     <em class="jxr_comment">/*</em>
-<a class="jxr_linenumber" name="L123" href="#L123">123</a> <em class="jxr_comment">    Todo correct this test.</em>
-<a class="jxr_linenumber" name="L124" href="#L124">124</a> <em class="jxr_comment">    public void testRecursiveKeyReferencesDOS2() throws Exception {</em>
-<a class="jxr_linenumber" name="L125" href="#L125">125</a> <em class="jxr_comment">        InputStream sourceDocument = this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml");</em>
-<a class="jxr_linenumber" name="L126" href="#L126">126</a> 
-<a class="jxr_linenumber" name="L127" href="#L127">127</a> <em class="jxr_comment">        String action = WSHandlerConstants.TIMESTAMP + " " + WSHandlerConstants.SIGNATURE + " " + WSHandlerConstants.ENCRYPT;</em>
-<a class="jxr_linenumber" name="L128" href="#L128">128</a> <em class="jxr_comment">        Properties properties = new Properties();</em>
-<a class="jxr_linenumber" name="L129" href="#L129">129</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, "{Element}{<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</a>}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;");</em>
-<a class="jxr_linenumber" name="L130" href="#L130">130</a> <em class="jxr_comment">        Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);</em>
-<a class="jxr_linenumber" name="L131" href="#L131">131</a> 
-<a class="jxr_linenumber" name="L132" href="#L132">132</a> <em class="jxr_comment">        XPathExpression xPathExpression = getXPath("/soap:Envelope/soap:Header/wsse:Security/xenc:EncryptedKey");</em>
-<a class="jxr_linenumber" name="L133" href="#L133">133</a> <em class="jxr_comment">        Element encryptedKeyElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);</em>
-<a class="jxr_linenumber" name="L134" href="#L134">134</a> <em class="jxr_comment">        encryptedKeyElement.removeAttribute("Id");</em>
-<a class="jxr_linenumber" name="L135" href="#L135">135</a> <em class="jxr_comment">        encryptedKeyElement.setAttributeNS(null, "Id", "2");</em>
-<a class="jxr_linenumber" name="L136" href="#L136">136</a> 
-<a class="jxr_linenumber" name="L137" href="#L137">137</a> <em class="jxr_comment">        xPathExpression = getXPath(".//dsig:X509Data");</em>
-<a class="jxr_linenumber" name="L138" href="#L138">138</a> <em class="jxr_comment">        Element keyIdentifierElement = (Element) xPathExpression.evaluate(encryptedKeyElement, XPathConstants.NODE);</em>
-<a class="jxr_linenumber" name="L139" href="#L139">139</a> <em class="jxr_comment">        Element securityTokenReferenceElement = (Element) keyIdentifierElement.getParentNode();</em>
-<a class="jxr_linenumber" name="L140" href="#L140">140</a> <em class="jxr_comment">        securityTokenReferenceElement.removeChild(keyIdentifierElement);</em>
-<a class="jxr_linenumber" name="L141" href="#L141">141</a> <em class="jxr_comment">        //wsse:Reference xmlns:wsse="<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd</a>" URI="#EncKeyId-1483925398"/&gt;</em>
-<a class="jxr_linenumber" name="L142" href="#L142">142</a> <em class="jxr_comment">        Element referenceElement = securedDocument.createElementNS(WSSConstants.TAG_WSSE_REFERENCE.getNamespaceURI(), WSSConstants.TAG_WSSE_REFERENCE.getLocalPart());</em>
-<a class="jxr_linenumber" name="L143" href="#L143">143</a> <em class="jxr_comment">        referenceElement.setAttributeNS(null, "URI", "#1");</em>
-<a class="jxr_linenumber" name="L144" href="#L144">144</a> <em class="jxr_comment">        securityTokenReferenceElement.appendChild(referenceElement);</em>
-<a class="jxr_linenumber" name="L145" href="#L145">145</a> 
-<a class="jxr_linenumber" name="L146" href="#L146">146</a> <em class="jxr_comment">        Element clonedEncryptedElement = (Element) encryptedKeyElement.cloneNode(true);</em>
-<a class="jxr_linenumber" name="L147" href="#L147">147</a> <em class="jxr_comment">        clonedEncryptedElement.removeAttribute("Id");</em>
-<a class="jxr_linenumber" name="L148" href="#L148">148</a> <em class="jxr_comment">        clonedEncryptedElement.setAttributeNS(null, "Id", "1");</em>
-<a class="jxr_linenumber" name="L149" href="#L149">149</a> 
-<a class="jxr_linenumber" name="L150" href="#L150">150</a> <em class="jxr_comment">        xPathExpression = getXPath(".//wsse:Reference");</em>
-<a class="jxr_linenumber" name="L151" href="#L151">151</a> <em class="jxr_comment">        Element newReferenceElement = (Element) xPathExpression.evaluate(clonedEncryptedElement, XPathConstants.NODE);</em>
-<a class="jxr_linenumber" name="L152" href="#L152">152</a> <em class="jxr_comment">        newReferenceElement.removeAttribute("URI");</em>
-<a class="jxr_linenumber" name="L153" href="#L153">153</a> <em class="jxr_comment">        newReferenceElement.setAttributeNS(null, "URI", "#2");</em>
+<a class="jxr_linenumber" name="L101" href="#L101">101</a>         WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
+<a class="jxr_linenumber" name="L102" href="#L102">102</a>         securityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
+<a class="jxr_linenumber" name="L103" href="#L103">103</a>         securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L104" href="#L104">104</a>         securityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L105" href="#L105">105</a> 
+<a class="jxr_linenumber" name="L106" href="#L106">106</a>         <strong class="jxr_keyword">try</strong> {
+<a class="jxr_linenumber" name="L107" href="#L107">107</a>             doInboundSecurity(securityProperties, xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
+<a class="jxr_linenumber" name="L108" href="#L108">108</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
+<a class="jxr_linenumber" name="L109" href="#L109">109</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
+<a class="jxr_linenumber" name="L110" href="#L110">110</a>             Throwable throwable = e.getCause();
+<a class="jxr_linenumber" name="L111" href="#L111">111</a>             Assert.assertNotNull(throwable);
+<a class="jxr_linenumber" name="L112" href="#L112">112</a>             <em class="jxr_comment">//we expect a "No SecurityToken found" since WSS says that a token must be declared before use.</em>
+<a class="jxr_linenumber" name="L113" href="#L113">113</a>             <em class="jxr_comment">//the declare before use is in the nature of streaming xml-security and therefore expected</em>
+<a class="jxr_linenumber" name="L114" href="#L114">114</a>             <em class="jxr_comment">//Assert.assertEquals(throwable.getMessage(), "An invalid security token was provided");</em>
+<a class="jxr_linenumber" name="L115" href="#L115">115</a>             Assert.assertEquals(throwable.getMessage(), <span class="jxr_string">"Recursive key reference detected."</span>);
+<a class="jxr_linenumber" name="L116" href="#L116">116</a>         }
+<a class="jxr_linenumber" name="L117" href="#L117">117</a>     }
+<a class="jxr_linenumber" name="L118" href="#L118">118</a> 
+<a class="jxr_linenumber" name="L119" href="#L119">119</a>     <em class="jxr_comment">/*</em>
+<a class="jxr_linenumber" name="L120" href="#L120">120</a> <em class="jxr_comment">    Todo correct this test.</em>
+<a class="jxr_linenumber" name="L121" href="#L121">121</a> <em class="jxr_comment">    public void testRecursiveKeyReferencesDOS2() throws Exception {</em>
+<a class="jxr_linenumber" name="L122" href="#L122">122</a> <em class="jxr_comment">        InputStream sourceDocument = this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml");</em>
+<a class="jxr_linenumber" name="L123" href="#L123">123</a> 
+<a class="jxr_linenumber" name="L124" href="#L124">124</a> <em class="jxr_comment">        String action = WSHandlerConstants.TIMESTAMP + " " + WSHandlerConstants.SIGNATURE + " " + WSHandlerConstants.ENCRYPT;</em>
+<a class="jxr_linenumber" name="L125" href="#L125">125</a> <em class="jxr_comment">        Properties properties = new Properties();</em>
+<a class="jxr_linenumber" name="L126" href="#L126">126</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, "{Element}{<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</a>}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;");</em>
+<a class="jxr_linenumber" name="L127" href="#L127">127</a> <em class="jxr_comment">        Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);</em>
+<a class="jxr_linenumber" name="L128" href="#L128">128</a> 
+<a class="jxr_linenumber" name="L129" href="#L129">129</a> <em class="jxr_comment">        XPathExpression xPathExpression = getXPath("/soap:Envelope/soap:Header/wsse:Security/xenc:EncryptedKey");</em>
+<a class="jxr_linenumber" name="L130" href="#L130">130</a> <em class="jxr_comment">        Element encryptedKeyElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);</em>
+<a class="jxr_linenumber" name="L131" href="#L131">131</a> <em class="jxr_comment">        encryptedKeyElement.removeAttribute("Id");</em>
+<a class="jxr_linenumber" name="L132" href="#L132">132</a> <em class="jxr_comment">        encryptedKeyElement.setAttributeNS(null, "Id", "2");</em>
+<a class="jxr_linenumber" name="L133" href="#L133">133</a> 
+<a class="jxr_linenumber" name="L134" href="#L134">134</a> <em class="jxr_comment">        xPathExpression = getXPath(".//dsig:X509Data");</em>
+<a class="jxr_linenumber" name="L135" href="#L135">135</a> <em class="jxr_comment">        Element keyIdentifierElement = (Element) xPathExpression.evaluate(encryptedKeyElement, XPathConstants.NODE);</em>
+<a class="jxr_linenumber" name="L136" href="#L136">136</a> <em class="jxr_comment">        Element securityTokenReferenceElement = (Element) keyIdentifierElement.getParentNode();</em>
+<a class="jxr_linenumber" name="L137" href="#L137">137</a> <em class="jxr_comment">        securityTokenReferenceElement.removeChild(keyIdentifierElement);</em>
+<a class="jxr_linenumber" name="L138" href="#L138">138</a> <em class="jxr_comment">        //wsse:Reference xmlns:wsse="<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd</a>" URI="#EncKeyId-1483925398"/&gt;</em>
+<a class="jxr_linenumber" name="L139" href="#L139">139</a> <em class="jxr_comment">        Element referenceElement = securedDocument.createElementNS(WSSConstants.TAG_WSSE_REFERENCE.getNamespaceURI(), WSSConstants.TAG_WSSE_REFERENCE.getLocalPart());</em>
+<a class="jxr_linenumber" name="L140" href="#L140">140</a> <em class="jxr_comment">        referenceElement.setAttributeNS(null, "URI", "#1");</em>
+<a class="jxr_linenumber" name="L141" href="#L141">141</a> <em class="jxr_comment">        securityTokenReferenceElement.appendChild(referenceElement);</em>
+<a class="jxr_linenumber" name="L142" href="#L142">142</a> 
+<a class="jxr_linenumber" name="L143" href="#L143">143</a> <em class="jxr_comment">        Element clonedEncryptedElement = (Element) encryptedKeyElement.cloneNode(true);</em>
+<a class="jxr_linenumber" name="L144" href="#L144">144</a> <em class="jxr_comment">        clonedEncryptedElement.removeAttribute("Id");</em>
+<a class="jxr_linenumber" name="L145" href="#L145">145</a> <em class="jxr_comment">        clonedEncryptedElement.setAttributeNS(null, "Id", "1");</em>
+<a class="jxr_linenumber" name="L146" href="#L146">146</a> 
+<a class="jxr_linenumber" name="L147" href="#L147">147</a> <em class="jxr_comment">        xPathExpression = getXPath(".//wsse:Reference");</em>
+<a class="jxr_linenumber" name="L148" href="#L148">148</a> <em class="jxr_comment">        Element newReferenceElement = (Element) xPathExpression.evaluate(clonedEncryptedElement, XPathConstants.NODE);</em>
+<a class="jxr_linenumber" name="L149" href="#L149">149</a> <em class="jxr_comment">        newReferenceElement.removeAttribute("URI");</em>
+<a class="jxr_linenumber" name="L150" href="#L150">150</a> <em class="jxr_comment">        newReferenceElement.setAttributeNS(null, "URI", "#2");</em>
+<a class="jxr_linenumber" name="L151" href="#L151">151</a> 
+<a class="jxr_linenumber" name="L152" href="#L152">152</a> <em class="jxr_comment">        Element securityHeaderNode = (Element) encryptedKeyElement.getParentNode();</em>
+<a class="jxr_linenumber" name="L153" href="#L153">153</a> <em class="jxr_comment">        securityHeaderNode.insertBefore(clonedEncryptedElement, encryptedKeyElement);</em>
 <a class="jxr_linenumber" name="L154" href="#L154">154</a> 
-<a class="jxr_linenumber" name="L155" href="#L155">155</a> <em class="jxr_comment">        Element securityHeaderNode = (Element) encryptedKeyElement.getParentNode();</em>
-<a class="jxr_linenumber" name="L156" href="#L156">156</a> <em class="jxr_comment">        securityHeaderNode.insertBefore(clonedEncryptedElement, encryptedKeyElement);</em>
-<a class="jxr_linenumber" name="L157" href="#L157">157</a> 
-<a class="jxr_linenumber" name="L158" href="#L158">158</a> <em class="jxr_comment">        doInboundSecurityWithWSS4J(securedDocument, WSHandlerConstants.ENCRYPT);</em>
-<a class="jxr_linenumber" name="L159" href="#L159">159</a> <em class="jxr_comment">    }</em>
-<a class="jxr_linenumber" name="L160" href="#L160">160</a> <em class="jxr_comment">    */</em>
-<a class="jxr_linenumber" name="L161" href="#L161">161</a> 
-<a class="jxr_linenumber" name="L162" href="#L162">162</a>     <em class="jxr_javadoccomment">/**</em>
-<a class="jxr_linenumber" name="L163" href="#L163">163</a> <em class="jxr_javadoccomment">     * Since we don't support (yet) external URI refs this shouldn't be a problem.</em>
-<a class="jxr_linenumber" name="L164" href="#L164">164</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a class="jxr_linenumber" name="L165" href="#L165">165</a> <em class="jxr_javadoccomment">     *</em>
-<a class="jxr_linenumber" name="L166" href="#L166">166</a> <em class="jxr_javadoccomment">     * @throws Exception</em>
-<a class="jxr_linenumber" name="L167" href="#L167">167</a> <em class="jxr_javadoccomment">     */</em>
-<a class="jxr_linenumber" name="L168" href="#L168">168</a>     @Test
-<a class="jxr_linenumber" name="L169" href="#L169">169</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> test_publicURIReferenceDOS() <strong class="jxr_keyword">throws</strong> Exception {
-<a class="jxr_linenumber" name="L170" href="#L170">170</a>         InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
-<a class="jxr_linenumber" name="L171" href="#L171">171</a> 
-<a class="jxr_linenumber" name="L172" href="#L172">172</a>         String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
-<a class="jxr_linenumber" name="L173" href="#L173">173</a>         Properties properties = <strong class="jxr_keyword">new</strong> Properties();
-<a class="jxr_linenumber" name="L174" href="#L174">174</a>         properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
-<a class="jxr_linenumber" name="L175" href="#L175">175</a>         properties.setProperty(WSHandlerConstants.ENC_SYM_ALGO, <span class="jxr_string">"http://www.w3.org/2001/04/xmlenc#aes256-cbc"</span>);
-<a class="jxr_linenumber" name="L176" href="#L176">176</a>         Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
-<a class="jxr_linenumber" name="L177" href="#L177">177</a> 
-<a class="jxr_linenumber" name="L178" href="#L178">178</a>         XPathExpression xPathExpression = getXPath(<span class="jxr_string">"//@URI"</span>);
-<a class="jxr_linenumber" name="L179" href="#L179">179</a>         Attr uri = (Attr) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);
-<a class="jxr_linenumber" name="L180" href="#L180">180</a>         uri.setNodeValue(<span class="jxr_string">"http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.23.tar.gz"</span>);
-<a class="jxr_linenumber" name="L181" href="#L181">181</a> 
-<a class="jxr_linenumber" name="L182" href="#L182">182</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
+<a class="jxr_linenumber" name="L155" href="#L155">155</a> <em class="jxr_comment">        doInboundSecurityWithWSS4J(securedDocument, WSHandlerConstants.ENCRYPT);</em>
+<a class="jxr_linenumber" name="L156" href="#L156">156</a> <em class="jxr_comment">    }</em>
+<a class="jxr_linenumber" name="L157" href="#L157">157</a> <em class="jxr_comment">    */</em>
+<a class="jxr_linenumber" name="L158" href="#L158">158</a> 
+<a class="jxr_linenumber" name="L159" href="#L159">159</a>     <em class="jxr_javadoccomment">/**</em>
+<a class="jxr_linenumber" name="L160" href="#L160">160</a> <em class="jxr_javadoccomment">     * Since we don't support (yet) external URI refs this shouldn't be a problem.</em>
+<a class="jxr_linenumber" name="L161" href="#L161">161</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a class="jxr_linenumber" name="L162" href="#L162">162</a> <em class="jxr_javadoccomment">     *</em>
+<a class="jxr_linenumber" name="L163" href="#L163">163</a> <em class="jxr_javadoccomment">     * @throws Exception</em>
+<a class="jxr_linenumber" name="L164" href="#L164">164</a> <em class="jxr_javadoccomment">     */</em>
+<a class="jxr_linenumber" name="L165" href="#L165">165</a>     @Test
+<a class="jxr_linenumber" name="L166" href="#L166">166</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> test_publicURIReferenceDOS() <strong class="jxr_keyword">throws</strong> Exception {
+<a class="jxr_linenumber" name="L167" href="#L167">167</a>         InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
+<a class="jxr_linenumber" name="L168" href="#L168">168</a> 
+<a class="jxr_linenumber" name="L169" href="#L169">169</a>         String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
+<a class="jxr_linenumber" name="L170" href="#L170">170</a>         Properties properties = <strong class="jxr_keyword">new</strong> Properties();
+<a class="jxr_linenumber" name="L171" href="#L171">171</a>         properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
+<a class="jxr_linenumber" name="L172" href="#L172">172</a>         properties.setProperty(WSHandlerConstants.ENC_SYM_ALGO, <span class="jxr_string">"http://www.w3.org/2001/04/xmlenc#aes256-cbc"</span>);
+<a class="jxr_linenumber" name="L173" href="#L173">173</a>         Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
+<a class="jxr_linenumber" name="L174" href="#L174">174</a> 
+<a class="jxr_linenumber" name="L175" href="#L175">175</a>         XPathExpression xPathExpression = getXPath(<span class="jxr_string">"//@URI"</span>);
+<a class="jxr_linenumber" name="L176" href="#L176">176</a>         Attr uri = (Attr) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);
+<a class="jxr_linenumber" name="L177" href="#L177">177</a>         uri.setNodeValue(<span class="jxr_string">"http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.23.tar.gz"</span>);
+<a class="jxr_linenumber" name="L178" href="#L178">178</a> 
+<a class="jxr_linenumber" name="L179" href="#L179">179</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
+<a class="jxr_linenumber" name="L180" href="#L180">180</a> 
+<a class="jxr_linenumber" name="L181" href="#L181">181</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
+<a class="jxr_linenumber" name="L182" href="#L182">182</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
 <a class="jxr_linenumber" name="L183" href="#L183">183</a> 
-<a class="jxr_linenumber" name="L184" href="#L184">184</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
-<a class="jxr_linenumber" name="L185" href="#L185">185</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
-<a class="jxr_linenumber" name="L186" href="#L186">186</a> 
-<a class="jxr_linenumber" name="L187" href="#L187">187</a>         WSSSecurityProperties inSecurityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
-<a class="jxr_linenumber" name="L188" href="#L188">188</a>         inSecurityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
-<a class="jxr_linenumber" name="L189" href="#L189">189</a>         inSecurityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L190" href="#L190">190</a>         inSecurityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L191" href="#L191">191</a>         inSecurityProperties.addIgnoreBSPRule(BSPRule.R3006);
-<a class="jxr_linenumber" name="L192" href="#L192">192</a> 
-<a class="jxr_linenumber" name="L193" href="#L193">193</a>         <strong class="jxr_keyword">try</strong> {
-<a class="jxr_linenumber" name="L194" href="#L194">194</a>             doInboundSecurity(inSecurityProperties, xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
-<a class="jxr_linenumber" name="L195" href="#L195">195</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
-<a class="jxr_linenumber" name="L196" href="#L196">196</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
-<a class="jxr_linenumber" name="L197" href="#L197">197</a>             Throwable throwable = e.getCause();
-<a class="jxr_linenumber" name="L198" href="#L198">198</a>             Assert.assertNotNull(throwable);
-<a class="jxr_linenumber" name="L199" href="#L199">199</a>             Assert.assertTrue(throwable.getMessage().contains(<span class="jxr_string">"Invalid digest of reference "</span>));
-<a class="jxr_linenumber" name="L200" href="#L200">200</a>         }
-<a class="jxr_linenumber" name="L201" href="#L201">201</a>     }
-<a class="jxr_linenumber" name="L202" href="#L202">202</a> 
-<a class="jxr_linenumber" name="L203" href="#L203">203</a>     @Test
-<a class="jxr_linenumber" name="L204" href="#L204">204</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testTransformationCodeInjection() <strong class="jxr_keyword">throws</strong> Exception {
-<a class="jxr_linenumber" name="L205" href="#L205">205</a>         <em class="jxr_comment">//todo when stream-xml-sec signature supports transformations</em>
-<a class="jxr_linenumber" name="L206" href="#L206">206</a>         <em class="jxr_comment">//probably we never will. This is a big security hole!</em>
-<a class="jxr_linenumber" name="L207" href="#L207">207</a>     }
-<a class="jxr_linenumber" name="L208" href="#L208">208</a> 
-<a class="jxr_linenumber" name="L209" href="#L209">209</a>     <em class="jxr_comment">/*</em>
-<a class="jxr_linenumber" name="L210" href="#L210">210</a> <em class="jxr_comment">    ** This test cannot be done here. We rely on the correct settings of the</em>
-<a class="jxr_linenumber" name="L211" href="#L211">211</a> <em class="jxr_comment">    * XMLStreamReader which is taken over us. @see InboundWSSec#processInMessage</em>
-<a class="jxr_linenumber" name="L212" href="#L212">212</a> 
-<a class="jxr_linenumber" name="L213" href="#L213">213</a> <em class="jxr_comment">    @Test</em>
-<a class="jxr_linenumber" name="L214" href="#L214">214</a> <em class="jxr_comment">    public void test_DosAttackWithRecursiveEntity() throws Exception {</em>
-<a class="jxr_linenumber" name="L215" href="#L215">215</a> <em class="jxr_comment">        InputStream sourceDocument = this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml");</em>
-<a class="jxr_linenumber" name="L216" href="#L216">216</a> 
-<a class="jxr_linenumber" name="L217" href="#L217">217</a> <em class="jxr_comment">        String action = WSHandlerConstants.TIMESTAMP + " " + WSHandlerConstants.SIGNATURE + " " + WSHandlerConstants.ENCRYPT;</em>
-<a class="jxr_linenumber" name="L218" href="#L218">218</a> <em class="jxr_comment">        Properties properties = new Properties();</em>
-<a class="jxr_linenumber" name="L219" href="#L219">219</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, "{Element}{<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</a>}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;");</em>
-<a class="jxr_linenumber" name="L220" href="#L220">220</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.ENC_SYM_ALGO, "<a href="http://www.w3.org/2001/04/xmlenc" target="alexandria_uri">http://www.w3.org/2001/04/xmlenc</a>#aes256-cbc");</em>
-<a class="jxr_linenumber" name="L221" href="#L221">221</a> <em class="jxr_comment">        Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);</em>
-<a class="jxr_linenumber" name="L222" href="#L222">222</a> 
-<a class="jxr_linenumber" name="L223" href="#L223">223</a> <em class="jxr_comment">        XPathExpression xPathExpression = getXPath("/soap:Envelope/soap:Header");</em>
-<a class="jxr_linenumber" name="L224" href="#L224">224</a> <em class="jxr_comment">        Element headerElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);</em>
-<a class="jxr_linenumber" name="L225" href="#L225">225</a> <em class="jxr_comment">        Element newElement = securedDocument.createElement("test");</em>
-<a class="jxr_linenumber" name="L226" href="#L226">226</a> <em class="jxr_comment">        headerElement.appendChild(newElement);</em>
-<a class="jxr_linenumber" name="L227" href="#L227">227</a> 
-<a class="jxr_linenumber" name="L228" href="#L228">228</a> <em class="jxr_comment">        ByteArrayOutputStream baos = new ByteArrayOutputStream();</em>
-<a class="jxr_linenumber" name="L229" href="#L229">229</a> 
-<a class="jxr_linenumber" name="L230" href="#L230">230</a> <em class="jxr_comment">        InputStream dtd = this.getClass().getClassLoader().getResourceAsStream("testdata/recursiveDTD.txt");</em>
-<a class="jxr_linenumber" name="L231" href="#L231">231</a> <em class="jxr_comment">        byte[] buff = new byte[1024];</em>
-<a class="jxr_linenumber" name="L232" href="#L232">232</a> <em class="jxr_comment">        int read = 0;</em>
-<a class="jxr_linenumber" name="L233" href="#L233">233</a> <em class="jxr_comment">        while ((read = dtd.read(buff)) != -1) {</em>
-<a class="jxr_linenumber" name="L234" href="#L234">234</a> <em class="jxr_comment">            baos.write(buff, 0, read);</em>
-<a class="jxr_linenumber" name="L235" href="#L235">235</a> <em class="jxr_comment">        }</em>
-<a class="jxr_linenumber" name="L236" href="#L236">236</a> <em class="jxr_comment">        dtd.close();</em>
-<a class="jxr_linenumber" name="L237" href="#L237">237</a> 
-<a class="jxr_linenumber" name="L238" href="#L238">238</a> <em class="jxr_comment">        Transformer transformer = TransformerFactory.newInstance().newTransformer();</em>
-<a class="jxr_linenumber" name="L239" href="#L239">239</a> <em class="jxr_comment">        transformer.setOutputProperty(OutputKeys.OMIT_XML_DECLARATION, "yes");</em>
-<a class="jxr_linenumber" name="L240" href="#L240">240</a> <em class="jxr_comment">        transformer.transform(new DOMSource(securedDocument), new StreamResult(baos));</em>
+<a class="jxr_linenumber" name="L184" href="#L184">184</a>         WSSSecurityProperties inSecurityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
+<a class="jxr_linenumber" name="L185" href="#L185">185</a>         inSecurityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
+<a class="jxr_linenumber" name="L186" href="#L186">186</a>         inSecurityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L187" href="#L187">187</a>         inSecurityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L188" href="#L188">188</a>         inSecurityProperties.addIgnoreBSPRule(BSPRule.R3006);
+<a class="jxr_linenumber" name="L189" href="#L189">189</a> 
+<a class="jxr_linenumber" name="L190" href="#L190">190</a>         <strong class="jxr_keyword">try</strong> {
+<a class="jxr_linenumber" name="L191" href="#L191">191</a>             doInboundSecurity(inSecurityProperties, xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
+<a class="jxr_linenumber" name="L192" href="#L192">192</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
+<a class="jxr_linenumber" name="L193" href="#L193">193</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
+<a class="jxr_linenumber" name="L194" href="#L194">194</a>             Throwable throwable = e.getCause();
+<a class="jxr_linenumber" name="L195" href="#L195">195</a>             Assert.assertNotNull(throwable);
+<a class="jxr_linenumber" name="L196" href="#L196">196</a>             Assert.assertTrue(throwable.getMessage().contains(<span class="jxr_string">"Invalid digest of reference "</span>));
+<a class="jxr_linenumber" name="L197" href="#L197">197</a>         }
+<a class="jxr_linenumber" name="L198" href="#L198">198</a>     }
+<a class="jxr_linenumber" name="L199" href="#L199">199</a> 
+<a class="jxr_linenumber" name="L200" href="#L200">200</a>     @Test
+<a class="jxr_linenumber" name="L201" href="#L201">201</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testTransformationCodeInjection() <strong class="jxr_keyword">throws</strong> Exception {
+<a class="jxr_linenumber" name="L202" href="#L202">202</a>         <em class="jxr_comment">//todo when stream-xml-sec signature supports transformations</em>
+<a class="jxr_linenumber" name="L203" href="#L203">203</a>         <em class="jxr_comment">//probably we never will. This is a big security hole!</em>
+<a class="jxr_linenumber" name="L204" href="#L204">204</a>     }
+<a class="jxr_linenumber" name="L205" href="#L205">205</a> 
+<a class="jxr_linenumber" name="L206" href="#L206">206</a>     <em class="jxr_comment">/*</em>
+<a class="jxr_linenumber" name="L207" href="#L207">207</a> <em class="jxr_comment">    ** This test cannot be done here. We rely on the correct settings of the</em>
+<a class="jxr_linenumber" name="L208" href="#L208">208</a> <em class="jxr_comment">    * XMLStreamReader which is taken over us. @see InboundWSSec#processInMessage</em>
+<a class="jxr_linenumber" name="L209" href="#L209">209</a> 
+<a class="jxr_linenumber" name="L210" href="#L210">210</a> <em class="jxr_comment">    @Test</em>
+<a class="jxr_linenumber" name="L211" href="#L211">211</a> <em class="jxr_comment">    public void test_DosAttackWithRecursiveEntity() throws Exception {</em>
+<a class="jxr_linenumber" name="L212" href="#L212">212</a> <em class="jxr_comment">        InputStream sourceDocument = this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml");</em>
+<a class="jxr_linenumber" name="L213" href="#L213">213</a> 
+<a class="jxr_linenumber" name="L214" href="#L214">214</a> <em class="jxr_comment">        String action = WSHandlerConstants.TIMESTAMP + " " + WSHandlerConstants.SIGNATURE + " " + WSHandlerConstants.ENCRYPT;</em>
+<a class="jxr_linenumber" name="L215" href="#L215">215</a> <em class="jxr_comment">        Properties properties = new Properties();</em>
+<a class="jxr_linenumber" name="L216" href="#L216">216</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, "{Element}{<a href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" target="alexandria_uri">http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</a>}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;");</em>
+<a class="jxr_linenumber" name="L217" href="#L217">217</a> <em class="jxr_comment">        properties.setProperty(WSHandlerConstants.ENC_SYM_ALGO, "<a href="http://www.w3.org/2001/04/xmlenc" target="alexandria_uri">http://www.w3.org/2001/04/xmlenc</a>#aes256-cbc");</em>
+<a class="jxr_linenumber" name="L218" href="#L218">218</a> <em class="jxr_comment">        Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);</em>
+<a class="jxr_linenumber" name="L219" href="#L219">219</a> 
+<a class="jxr_linenumber" name="L220" href="#L220">220</a> <em class="jxr_comment">        XPathExpression xPathExpression = getXPath("/soap:Envelope/soap:Header");</em>
+<a class="jxr_linenumber" name="L221" href="#L221">221</a> <em class="jxr_comment">        Element headerElement = (Element) xPathExpression.evaluate(securedDocument, XPathConstants.NODE);</em>
+<a class="jxr_linenumber" name="L222" href="#L222">222</a> <em class="jxr_comment">        Element newElement = securedDocument.createElement("test");</em>
+<a class="jxr_linenumber" name="L223" href="#L223">223</a> <em class="jxr_comment">        headerElement.appendChild(newElement);</em>
+<a class="jxr_linenumber" name="L224" href="#L224">224</a> 
+<a class="jxr_linenumber" name="L225" href="#L225">225</a> <em class="jxr_comment">        ByteArrayOutputStream baos = new ByteArrayOutputStream();</em>
+<a class="jxr_linenumber" name="L226" href="#L226">226</a> 
+<a class="jxr_linenumber" name="L227" href="#L227">227</a> <em class="jxr_comment">        InputStream dtd = this.getClass().getClassLoader().getResourceAsStream("testdata/recursiveDTD.txt");</em>
+<a class="jxr_linenumber" name="L228" href="#L228">228</a> <em class="jxr_comment">        byte[] buff = new byte[1024];</em>
+<a class="jxr_linenumber" name="L229" href="#L229">229</a> <em class="jxr_comment">        int read = 0;</em>
+<a class="jxr_linenumber" name="L230" href="#L230">230</a> <em class="jxr_comment">        while ((read = dtd.read(buff)) != -1) {</em>
+<a class="jxr_linenumber" name="L231" href="#L231">231</a> <em class="jxr_comment">            baos.write(buff, 0, read);</em>
+<a class="jxr_linenumber" name="L232" href="#L232">232</a> <em class="jxr_comment">        }</em>
+<a class="jxr_linenumber" name="L233" href="#L233">233</a> <em class="jxr_comment">        dtd.close();</em>
+<a class="jxr_linenumber" name="L234" href="#L234">234</a> 
+<a class="jxr_linenumber" name="L235" href="#L235">235</a> <em class="jxr_comment">        Transformer transformer = TransformerFactory.newInstance().newTransformer();</em>
+<a class="jxr_linenumber" name="L236" href="#L236">236</a> <em class="jxr_comment">        transformer.setOutputProperty(OutputKeys.OMIT_XML_DECLARATION, "yes");</em>
+<a class="jxr_linenumber" name="L237" href="#L237">237</a> <em class="jxr_comment">        transformer.transform(new DOMSource(securedDocument), new StreamResult(baos));</em>
+<a class="jxr_linenumber" name="L238" href="#L238">238</a> 
+<a class="jxr_linenumber" name="L239" href="#L239">239</a> <em class="jxr_comment">        String soap = new String(baos.toByteArray(), "utf-8");</em>
+<a class="jxr_linenumber" name="L240" href="#L240">240</a> <em class="jxr_comment">        soap = soap.replaceFirst("&lt;test/&gt;", "&lt;test&gt;&amp;x100;&lt;/test&gt;");</em>
 <a class="jxr_linenumber" name="L241" href="#L241">241</a> 
-<a class="jxr_linenumber" name="L242" href="#L242">242</a> <em class="jxr_comment">        String soap = new String(baos.toByteArray(), "utf-8");</em>
-<a class="jxr_linenumber" name="L243" href="#L243">243</a> <em class="jxr_comment">        soap = soap.replaceFirst("&lt;test/&gt;", "&lt;test&gt;&amp;x100;&lt;/test&gt;");</em>
-<a class="jxr_linenumber" name="L244" href="#L244">244</a> 
-<a class="jxr_linenumber" name="L245" href="#L245">245</a> <em class="jxr_comment">        System.out.println(soap);</em>
-<a class="jxr_linenumber" name="L246" href="#L246">246</a> 
-<a class="jxr_linenumber" name="L247" href="#L247">247</a> <em class="jxr_comment">        WSSSecurityProperties inSecurityProperties = new WSSSecurityProperties();</em>
-<a class="jxr_linenumber" name="L248" href="#L248">248</a> <em class="jxr_comment">        inSecurityProperties.setCallbackHandler(new CallbackHandlerImpl());</em>
-<a class="jxr_linenumber" name="L249" href="#L249">249</a> <em class="jxr_comment">        inSecurityProperties.loadSignatureVerificationKeystore(this.getClass().getClassLoader().getResource("transmitter.jks"), "default".toCharArray());</em>
-<a class="jxr_linenumber" name="L250" href="#L250">250</a> <em class="jxr_comment">        inSecurityProperties.loadDecryptionKeystore(this.getClass().getClassLoader().getResource("transmitter.jks"), "default".toCharArray());</em>
-<a class="jxr_linenumber" name="L251" href="#L251">251</a> 
-<a class="jxr_linenumber" name="L252" href="#L252">252</a> <em class="jxr_comment">        try {</em>
-<a class="jxr_linenumber" name="L253" href="#L253">253</a> <em class="jxr_comment">            Document document = doInboundSecurity(inSecurityProperties, new ByteArrayInputStream(soap.getBytes()));</em>
-<a class="jxr_linenumber" name="L254" href="#L254">254</a> <em class="jxr_comment">            Assert.fail("Expected XMLStreamException");</em>
-<a class="jxr_linenumber" name="L255" href="#L255">255</a> <em class="jxr_comment">        } catch (XMLStreamException e) {</em>
-<a class="jxr_linenumber" name="L256" href="#L256">256</a> <em class="jxr_comment">            System.out.println(e.getMessage());</em>
-<a class="jxr_linenumber" name="L257" href="#L257">257</a> <em class="jxr_comment">            e.printStackTrace();</em>
-<a class="jxr_linenumber" name="L258" href="#L258">258</a> <em class="jxr_comment">            Throwable throwable = e.getCause();</em>
+<a class="jxr_linenumber" name="L242" href="#L242">242</a> <em class="jxr_comment">        System.out.println(soap);</em>
+<a class="jxr_linenumber" name="L243" href="#L243">243</a> 
+<a class="jxr_linenumber" name="L244" href="#L244">244</a> <em class="jxr_comment">        WSSSecurityProperties inSecurityProperties = new WSSSecurityProperties();</em>
+<a class="jxr_linenumber" name="L245" href="#L245">245</a> <em class="jxr_comment">        inSecurityProperties.setCallbackHandler(new CallbackHandlerImpl());</em>
+<a class="jxr_linenumber" name="L246" href="#L246">246</a> <em class="jxr_comment">        inSecurityProperties.loadSignatureVerificationKeystore(this.getClass().getClassLoader().getResource("transmitter.jks"), "default".toCharArray());</em>
+<a class="jxr_linenumber" name="L247" href="#L247">247</a> <em class="jxr_comment">        inSecurityProperties.loadDecryptionKeystore(this.getClass().getClassLoader().getResource("transmitter.jks"), "default".toCharArray());</em>
+<a class="jxr_linenumber" name="L248" href="#L248">248</a> 
+<a class="jxr_linenumber" name="L249" href="#L249">249</a> <em class="jxr_comment">        try {</em>
+<a class="jxr_linenumber" name="L250" href="#L250">250</a> <em class="jxr_comment">            Document document = doInboundSecurity(inSecurityProperties, new ByteArrayInputStream(soap.getBytes()));</em>
+<a class="jxr_linenumber" name="L251" href="#L251">251</a> <em class="jxr_comment">            Assert.fail("Expected XMLStreamException");</em>
+<a class="jxr_linenumber" name="L252" href="#L252">252</a> <em class="jxr_comment">        } catch (XMLStreamException e) {</em>
+<a class="jxr_linenumber" name="L253" href="#L253">253</a> <em class="jxr_comment">            System.out.println(e.getMessage());</em>
+<a class="jxr_linenumber" name="L254" href="#L254">254</a> <em class="jxr_comment">            e.printStackTrace();</em>
+<a class="jxr_linenumber" name="L255" href="#L255">255</a> <em class="jxr_comment">            Throwable throwable = e.getCause();</em>
+<a class="jxr_linenumber" name="L256" href="#L256">256</a> <em class="jxr_comment">            Assert.assertNotNull(throwable);</em>
+<a class="jxr_linenumber" name="L257" href="#L257">257</a> <em class="jxr_comment">            Assert.assertTrue(throwable instanceof WSSecurityException);</em>
+<a class="jxr_linenumber" name="L258" href="#L258">258</a> <em class="jxr_comment">            throwable = throwable.getCause();</em>
 <a class="jxr_linenumber" name="L259" href="#L259">259</a> <em class="jxr_comment">            Assert.assertNotNull(throwable);</em>
-<a class="jxr_linenumber" name="L260" href="#L260">260</a> <em class="jxr_comment">            Assert.assertTrue(throwable instanceof WSSecurityException);</em>
+<a class="jxr_linenumber" name="L260" href="#L260">260</a> <em class="jxr_comment">            Assert.assertTrue(throwable instanceof PolicyViolationException);</em>
 <a class="jxr_linenumber" name="L261" href="#L261">261</a> <em class="jxr_comment">            throwable = throwable.getCause();</em>
 <a class="jxr_linenumber" name="L262" href="#L262">262</a> <em class="jxr_comment">            Assert.assertNotNull(throwable);</em>
 <a class="jxr_linenumber" name="L263" href="#L263">263</a> <em class="jxr_comment">            Assert.assertTrue(throwable instanceof PolicyViolationException);</em>
-<a class="jxr_linenumber" name="L264" href="#L264">264</a> <em class="jxr_comment">            throwable = throwable.getCause();</em>
-<a class="jxr_linenumber" name="L265" href="#L265">265</a> <em class="jxr_comment">            Assert.assertNotNull(throwable);</em>
-<a class="jxr_linenumber" name="L266" href="#L266">266</a> <em class="jxr_comment">            Assert.assertTrue(throwable instanceof PolicyViolationException);</em>
-<a class="jxr_linenumber" name="L267" href="#L267">267</a> <em class="jxr_comment">            Assert.assertEquals(throwable.getMessage(), "No policy alternative could be satisfied");</em>
-<a class="jxr_linenumber" name="L268" href="#L268">268</a> <em class="jxr_comment">        }</em>
-<a class="jxr_linenumber" name="L269" href="#L269">269</a> <em class="jxr_comment">    }</em>
-<a class="jxr_linenumber" name="L270" href="#L270">270</a> <em class="jxr_comment">    */</em>
+<a class="jxr_linenumber" name="L264" href="#L264">264</a> <em class="jxr_comment">            Assert.assertEquals(throwable.getMessage(), "No policy alternative could be satisfied");</em>
+<a class="jxr_linenumber" name="L265" href="#L265">265</a> <em class="jxr_comment">        }</em>
+<a class="jxr_linenumber" name="L266" href="#L266">266</a> <em class="jxr_comment">    }</em>
+<a class="jxr_linenumber" name="L267" href="#L267">267</a> <em class="jxr_comment">    */</em>
+<a class="jxr_linenumber" name="L268" href="#L268">268</a> 
+<a class="jxr_linenumber" name="L269" href="#L269">269</a>     @Test
+<a class="jxr_linenumber" name="L270" href="#L270">270</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMaximumAllowedReferencesPerManifest() <strong class="jxr_keyword">throws</strong> Exception {
 <a class="jxr_linenumber" name="L271" href="#L271">271</a> 
-<a class="jxr_linenumber" name="L272" href="#L272">272</a>     @Test
-<a class="jxr_linenumber" name="L273" href="#L273">273</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testReplayAttackInbound() <strong class="jxr_keyword">throws</strong> Exception {
-<a class="jxr_linenumber" name="L274" href="#L274">274</a> 
-<a class="jxr_linenumber" name="L275" href="#L275">275</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
-<a class="jxr_linenumber" name="L276" href="#L276">276</a>         {
-<a class="jxr_linenumber" name="L277" href="#L277">277</a>             InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
-<a class="jxr_linenumber" name="L278" href="#L278">278</a>             String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE;
-<a class="jxr_linenumber" name="L279" href="#L279">279</a>             Properties properties = <strong class="jxr_keyword">new</strong> Properties();
-<a class="jxr_linenumber" name="L280" href="#L280">280</a>             properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
-<a class="jxr_linenumber" name="L281" href="#L281">281</a>             Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
+<a class="jxr_linenumber" name="L272" href="#L272">272</a>         InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
+<a class="jxr_linenumber" name="L273" href="#L273">273</a> 
+<a class="jxr_linenumber" name="L274" href="#L274">274</a>         String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
+<a class="jxr_linenumber" name="L275" href="#L275">275</a>         Properties properties = <strong class="jxr_keyword">new</strong> Properties();
+<a class="jxr_linenumber" name="L276" href="#L276">276</a>         properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://www.w3.org/1999/XMLSchema}complexType;{Element}{http://www.w3.org/1999/XMLSchema}simpleType;"</span>);
+<a class="jxr_linenumber" name="L277" href="#L277">277</a>         Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
+<a class="jxr_linenumber" name="L278" href="#L278">278</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
+<a class="jxr_linenumber" name="L279" href="#L279">279</a> 
+<a class="jxr_linenumber" name="L280" href="#L280">280</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
+<a class="jxr_linenumber" name="L281" href="#L281">281</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
 <a class="jxr_linenumber" name="L282" href="#L282">282</a> 
-<a class="jxr_linenumber" name="L283" href="#L283">283</a>             <em class="jxr_comment">//some test that we can really sure we get what we want from WSS4J</em>
-<a class="jxr_linenumber" name="L284" href="#L284">284</a>             NodeList nodeList = securedDocument.getElementsByTagNameNS(WSSConstants.TAG_dsig_Signature.getNamespaceURI(), WSSConstants.TAG_dsig_Signature.getLocalPart());
-<a class="jxr_linenumber" name="L285" href="#L285">285</a>             Assert.assertEquals(nodeList.item(0).getParentNode().getLocalName(), WSSConstants.TAG_WSSE_SECURITY.getLocalPart());
-<a class="jxr_linenumber" name="L286" href="#L286">286</a> 
-<a class="jxr_linenumber" name="L287" href="#L287">287</a>             javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
-<a class="jxr_linenumber" name="L288" href="#L288">288</a>             transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
-<a class="jxr_linenumber" name="L289" href="#L289">289</a>         }
-<a class="jxr_linenumber" name="L290" href="#L290">290</a> 
-<a class="jxr_linenumber" name="L291" href="#L291">291</a>         <em class="jxr_comment">//done signature; now test sig-verification:</em>
-<a class="jxr_linenumber" name="L292" href="#L292">292</a>         {
-<a class="jxr_linenumber" name="L293" href="#L293">293</a>             WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
-<a class="jxr_linenumber" name="L294" href="#L294">294</a>             securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L295" href="#L295">295</a>             InboundWSSec wsSecIn = WSSec.getInboundWSSec(securityProperties, false, <strong class="jxr_keyword">true</strong>);
-<a class="jxr_linenumber" name="L296" href="#L296">296</a>             XMLStreamReader xmlStreamReader = wsSecIn.processInMessage(xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
-<a class="jxr_linenumber" name="L297" href="#L297">297</a> 
-<a class="jxr_linenumber" name="L298" href="#L298">298</a>             StAX2DOM.readDoc(documentBuilderFactory.newDocumentBuilder(), xmlStreamReader);
-<a class="jxr_linenumber" name="L299" href="#L299">299</a> 
-<a class="jxr_linenumber" name="L300" href="#L300">300</a>             <strong class="jxr_keyword">try</strong> {
-<a class="jxr_linenumber" name="L301" href="#L301">301</a>                 xmlStreamReader = wsSecIn.processInMessage(xmlInputFactory.createXMLStreamReader(<strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
-<a class="jxr_linenumber" name="L302" href="#L302">302</a>                 StAX2DOM.readDoc(documentBuilderFactory.newDocumentBuilder(), xmlStreamReader);
-<a class="jxr_linenumber" name="L303" href="#L303">303</a>                 Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
-<a class="jxr_linenumber" name="L304" href="#L304">304</a>             } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
-<a class="jxr_linenumber" name="L305" href="#L305">305</a>                 Assert.assertEquals(((WSSecurityException) e.getCause()).getFaultCode(), WSSecurityException.MESSAGE_EXPIRED);
-<a class="jxr_linenumber" name="L306" href="#L306">306</a>             }
-<a class="jxr_linenumber" name="L307" href="#L307">307</a>         }
-<a class="jxr_linenumber" name="L308" href="#L308">308</a>     }
-<a class="jxr_linenumber" name="L309" href="#L309">309</a> 
-<a class="jxr_linenumber" name="L310" href="#L310">310</a>     @Test
-<a class="jxr_linenumber" name="L311" href="#L311">311</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMaximumAllowedReferencesPerManifest() <strong class="jxr_keyword">throws</strong> Exception {
-<a class="jxr_linenumber" name="L312" href="#L312">312</a> 
-<a class="jxr_linenumber" name="L313" href="#L313">313</a>         InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
+<a class="jxr_linenumber" name="L283" href="#L283">283</a>         WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
+<a class="jxr_linenumber" name="L284" href="#L284">284</a>         securityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
+<a class="jxr_linenumber" name="L285" href="#L285">285</a>         securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L286" href="#L286">286</a>         securityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L287" href="#L287">287</a> 
+<a class="jxr_linenumber" name="L288" href="#L288">288</a>         <strong class="jxr_keyword">try</strong> {
+<a class="jxr_linenumber" name="L289" href="#L289">289</a>             doInboundSecurity(securityProperties,
+<a class="jxr_linenumber" name="L290" href="#L290">290</a>                     xmlInputFactory.createXMLStreamReader(
+<a class="jxr_linenumber" name="L291" href="#L291">291</a>                             <strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
+<a class="jxr_linenumber" name="L292" href="#L292">292</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
+<a class="jxr_linenumber" name="L293" href="#L293">293</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
+<a class="jxr_linenumber" name="L294" href="#L294">294</a>             Assert.assertTrue(e.getCause() instanceof WSSecurityException);
+<a class="jxr_linenumber" name="L295" href="#L295">295</a>             Assert.assertEquals(((WSSecurityException) e.getCause()).getFaultCode(), WSSecurityException.INVALID_SECURITY);
+<a class="jxr_linenumber" name="L296" href="#L296">296</a>         }
+<a class="jxr_linenumber" name="L297" href="#L297">297</a>     }
+<a class="jxr_linenumber" name="L298" href="#L298">298</a> 
+<a class="jxr_linenumber" name="L299" href="#L299">299</a>     @Test
+<a class="jxr_linenumber" name="L300" href="#L300">300</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMaximumAllowedTransformsPerReference() <strong class="jxr_keyword">throws</strong> Exception {
+<a class="jxr_linenumber" name="L301" href="#L301">301</a> 
+<a class="jxr_linenumber" name="L302" href="#L302">302</a>         <strong class="jxr_keyword">if</strong> (getJavaSpecificationVersion() &gt; 1.7) {
+<a class="jxr_linenumber" name="L303" href="#L303">303</a>             System.out.println(<span class="jxr_string">"testMaximumAllowedTransformsPerReference skipped"</span>);
+<a class="jxr_linenumber" name="L304" href="#L304">304</a>             <strong class="jxr_keyword">return</strong>;
+<a class="jxr_linenumber" name="L305" href="#L305">305</a>         }
+<a class="jxr_linenumber" name="L306" href="#L306">306</a> 
+<a class="jxr_linenumber" name="L307" href="#L307">307</a>         InputStream sourceDocument = <strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResourceAsStream(<span class="jxr_string">"testdata/plain-soap-1.1.xml"</span>);
+<a class="jxr_linenumber" name="L308" href="#L308">308</a> 
+<a class="jxr_linenumber" name="L309" href="#L309">309</a>         String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
+<a class="jxr_linenumber" name="L310" href="#L310">310</a>         Properties properties = <strong class="jxr_keyword">new</strong> Properties();
+<a class="jxr_linenumber" name="L311" href="#L311">311</a>         properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd}Timestamp;{Element}{http://schemas.xmlsoap.org/soap/envelope/}Body;"</span>);
+<a class="jxr_linenumber" name="L312" href="#L312">312</a>         Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
+<a class="jxr_linenumber" name="L313" href="#L313">313</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
 <a class="jxr_linenumber" name="L314" href="#L314">314</a> 
-<a class="jxr_linenumber" name="L315" href="#L315">315</a>         String action = WSHandlerConstants.TIMESTAMP + <span class="jxr_string">" "</span> + WSHandlerConstants.SIGNATURE + <span class="jxr_string">" "</span> + WSHandlerConstants.ENCRYPT;
-<a class="jxr_linenumber" name="L316" href="#L316">316</a>         Properties properties = <strong class="jxr_keyword">new</strong> Properties();
-<a class="jxr_linenumber" name="L317" href="#L317">317</a>         properties.setProperty(WSHandlerConstants.SIGNATURE_PARTS, <span class="jxr_string">"{Element}{http://www.w3.org/1999/XMLSchema}complexType;{Element}{http://www.w3.org/1999/XMLSchema}simpleType;"</span>);
-<a class="jxr_linenumber" name="L318" href="#L318">318</a>         Document securedDocument = doOutboundSecurityWithWSS4J(sourceDocument, action, properties);
-<a class="jxr_linenumber" name="L319" href="#L319">319</a>         ByteArrayOutputStream baos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream();
-<a class="jxr_linenumber" name="L320" href="#L320">320</a> 
-<a class="jxr_linenumber" name="L321" href="#L321">321</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
-<a class="jxr_linenumber" name="L322" href="#L322">322</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
-<a class="jxr_linenumber" name="L323" href="#L323">323</a> 
-<a class="jxr_linenumber" name="L324" href="#L324">324</a>         WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
-<a class="jxr_linenumber" name="L325" href="#L325">325</a>         securityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
-<a class="jxr_linenumber" name="L326" href="#L326">326</a>         securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L327" href="#L327">327</a>         securityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
-<a class="jxr_linenumber" name="L328" href="#L328">328</a> 
-<a class="jxr_linenumber" name="L329" href="#L329">329</a>         <strong class="jxr_keyword">try</strong> {
-<a class="jxr_linenumber" name="L330" href="#L330">330</a>             doInboundSecurity(securityProperties,
-<a class="jxr_linenumber" name="L331" href="#L331">331</a>                     xmlInputFactory.createXMLStreamReader(
-<a class="jxr_linenumber" name="L332" href="#L332">332</a>                             <strong class="jxr_keyword">new</strong> ByteArrayInputStream(baos.toByteArray())));
-<a class="jxr_linenumber" name="L333" href="#L333">333</a>             Assert.fail(<span class="jxr_string">"Expected XMLStreamException"</span>);
-<a class="jxr_linenumber" name="L334" href="#L334">334</a>         } <strong class="jxr_keyword">catch</strong> (XMLStreamException e) {
-<a class="jxr_linenumber" name="L335" href="#L335">335</a>             Assert.assertTrue(e.getCause() instanceof WSSecurityException);
-<a class="jxr_linenumber" name="L336" href="#L336">336</a>             Assert.assertEquals(((WSSecurityException) e.getCause()).getFaultCode(), WSSecurityException.INVALID_SECURITY);
-<a class="jxr_linenumber" name="L337" href="#L337">337</a>         }
-<a class="jxr_linenumber" name="L338" href="#L338">338</a>     }
+<a class="jxr_linenumber" name="L315" href="#L315">315</a>         javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer();
+<a class="jxr_linenumber" name="L316" href="#L316">316</a>         transformer.transform(<strong class="jxr_keyword">new</strong> DOMSource(securedDocument), <strong class="jxr_keyword">new</strong> StreamResult(baos));
+<a class="jxr_linenumber" name="L317" href="#L317">317</a> 
+<a class="jxr_linenumber" name="L318" href="#L318">318</a>         WSSSecurityProperties securityProperties = <strong class="jxr_keyword">new</strong> WSSSecurityProperties();
+<a class="jxr_linenumber" name="L319" href="#L319">319</a>         securityProperties.setCallbackHandler(<strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/wss4j/stax/test/CallbackHandlerImpl.html">CallbackHandlerImpl</a>());
+<a class="jxr_linenumber" name="L320" href="#L320">320</a>         securityProperties.loadSignatureVerificationKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L321" href="#L321">321</a>         securityProperties.loadDecryptionKeystore(<strong class="jxr_keyword">this</strong>.getClass().getClassLoader().getResource(<span class="jxr_string">"receiver.jks"</span>), <span class="jxr_string">"default"</span>.toCharArray());
+<a class="jxr_linenumber" name="L322" href="#L322">322</a> 
+<a class="jxr_linenumber" name="L323" href="#L323">323</a>         <strong class="jxr_keyword">int</strong> oldval = 0;
+<a class="jxr_linenumber" name="L324" href="#L324">324</a>         <strong class="jxr_keyword">try</strong> {
+<a class="jxr_linenumber" name="L325" href="#L325">325</a>             Init.init(WSSec.<strong class="jxr_keyword">class</strong>.getClassLoader().getResource(<span class="jxr_string">"wss/wss-config.xml"</span>).toURI(), WSSec.<strong class="jxr_keyword">class</strong>);
+<a class="jxr_linenumber" name="L326" href="#L326">326</a>             oldval = changeValueOfMaximumAllowedTransformsPerReference(0);
+<a class="jxr_linenumber" name="L327" href="#L327">327</a>             doInboundSecurity(securityProperties,

[... 578 lines stripped ...]



Mime
View raw message