/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.wss4j.stax.test; import java.io.ByteArrayInputStream; import java.io.ByteArrayOutputStream; import java.io.InputStream; import java.nio.charset.StandardCharsets; import java.util.ArrayList; import java.util.List; import java.util.Properties; import javax.xml.stream.XMLStreamReader; import javax.xml.stream.XMLStreamWriter; import javax.xml.xpath.XPathConstants; import javax.xml.xpath.XPathExpression; import org.apache.wss4j.common.crypto.CryptoFactory; import org.apache.wss4j.common.crypto.JasyptPasswordEncryptor; import org.apache.wss4j.common.crypto.PasswordEncryptor; import org.apache.wss4j.dom.handler.WSHandlerConstants; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.setup.OutboundWSSec; import org.apache.wss4j.stax.setup.WSSec; import org.apache.wss4j.stax.test.utils.XmlReaderToWriter; import org.apache.xml.security.stax.securityEvent.SecurityEvent; import org.junit.Assert; import org.junit.Test; import org.w3c.dom.Document; import org.w3c.dom.Element; import org.w3c.dom.Node; import org.w3c.dom.NodeList; /** * This is a test for signing and encrypting using a Crypto properties file with an encrypted * password */ public class PasswordEncryptorTest extends AbstractTestBase { @Test public void testSignatureCryptoPropertiesOutbound() throws Exception { ByteArrayOutputStream baos = new ByteArrayOutputStream(); { WSSSecurityProperties securityProperties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.SIGNATURE); securityProperties.setActions(actions); Properties properties = CryptoFactory.getProperties("transmitter-crypto-enc.properties", this.getClass().getClassLoader()); PasswordEncryptor passwordEncryptor = new JasyptPasswordEncryptor(new CallbackHandlerImpl()); securityProperties.setSignatureCryptoProperties(properties, passwordEncryptor); securityProperties.setSignatureUser("transmitter"); securityProperties.setCallbackHandler(new CallbackHandlerImpl()); OutboundWSSec wsSecOut = WSSec.getOutboundWSSec(securityProperties); XMLStreamWriter xmlStreamWriter = wsSecOut.processOutMessage(baos, StandardCharsets.UTF_8.name(), new ArrayList<SecurityEvent>()); XMLStreamReader xmlStreamReader = xmlInputFactory.createXMLStreamReader(this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml")); XmlReaderToWriter.writeAll(xmlStreamReader, xmlStreamWriter); xmlStreamWriter.close(); Document document = documentBuilderFactory.newDocumentBuilder().parse(new ByteArrayInputStream(baos.toByteArray())); NodeList nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_dsig_Signature.getNamespaceURI(), WSSConstants.TAG_dsig_Signature.getLocalPart()); Assert.assertEquals(nodeList.item(0).getParentNode().getLocalName(), WSSConstants.TAG_WSSE_SECURITY.getLocalPart()); nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_dsig_Reference.getNamespaceURI(), WSSConstants.TAG_dsig_Reference.getLocalPart()); Assert.assertEquals(nodeList.getLength(), 1); nodeList = document.getElementsByTagNameNS(WSSConstants.NS_SOAP11, WSSConstants.TAG_SOAP_BODY_LN); Assert.assertEquals(nodeList.getLength(), 1); String idAttrValue = ((Element) nodeList.item(0)).getAttributeNS(WSSConstants.ATT_WSU_ID.getNamespaceURI(), WSSConstants.ATT_WSU_ID.getLocalPart()); Assert.assertNotNull(idAttrValue); Assert.assertTrue(idAttrValue.length() > 0); nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_c14nExcl_InclusiveNamespaces.getNamespaceURI(), WSSConstants.TAG_c14nExcl_InclusiveNamespaces.getLocalPart()); Assert.assertEquals(nodeList.getLength(), 2); Assert.assertEquals(((Element) nodeList.item(0)).getAttributeNS(null, WSSConstants.ATT_NULL_PrefixList.getLocalPart()), "env"); Assert.assertEquals(((Element) nodeList.item(1)).getAttributeNS(null, WSSConstants.ATT_NULL_PrefixList.getLocalPart()), ""); } //done signature; now test sig-verification: { String action = WSHandlerConstants.SIGNATURE; doInboundSecurityWithWSS4J(documentBuilderFactory.newDocumentBuilder().parse(new ByteArrayInputStream(baos.toByteArray())), action); } } @Test public void testEncDecryptionCryptoPropertiesOutbound() throws Exception { ByteArrayOutputStream baos; { WSSSecurityProperties securityProperties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.ENCRYPT); securityProperties.setActions(actions); Properties properties = CryptoFactory.getProperties("transmitter-crypto-enc.properties", this.getClass().getClassLoader()); PasswordEncryptor passwordEncryptor = new JasyptPasswordEncryptor(new CallbackHandlerImpl()); securityProperties.setEncryptionCryptoProperties(properties, passwordEncryptor); securityProperties.setEncryptionUser("receiver"); InputStream sourceDocument = this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml"); baos = doOutboundSecurity(securityProperties, sourceDocument); Document document = documentBuilderFactory.newDocumentBuilder().parse(new ByteArrayInputStream(baos.toByteArray())); NodeList nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_xenc_EncryptedKey.getNamespaceURI(), WSSConstants.TAG_xenc_EncryptedKey.getLocalPart()); Assert.assertEquals(nodeList.item(0).getParentNode().getLocalName(), WSSConstants.TAG_WSSE_SECURITY.getLocalPart()); XPathExpression xPathExpression = getXPath("/soap:Envelope/soap:Header/wsse:Security/xenc:EncryptedKey/xenc:EncryptionMethod[@Algorithm='http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p']"); Node node = (Node) xPathExpression.evaluate(document, XPathConstants.NODE); Assert.assertNotNull(node); nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_xenc_DataReference.getNamespaceURI(), WSSConstants.TAG_xenc_DataReference.getLocalPart()); Assert.assertEquals(nodeList.getLength(), 1); nodeList = document.getElementsByTagNameNS(WSSConstants.TAG_xenc_EncryptedData.getNamespaceURI(), WSSConstants.TAG_xenc_EncryptedData.getLocalPart()); Assert.assertEquals(nodeList.getLength(), 1); xPathExpression = getXPath("/soap:Envelope/soap:Body/xenc:EncryptedData/xenc:EncryptionMethod[@Algorithm='http://www.w3.org/2001/04/xmlenc#aes256-cbc']"); node = (Node) xPathExpression.evaluate(document, XPathConstants.NODE); Assert.assertNotNull(node); Assert.assertEquals(node.getParentNode().getParentNode().getLocalName(), "Body"); NodeList childNodes = node.getParentNode().getParentNode().getChildNodes(); for (int i = 0; i < childNodes.getLength(); i++) { Node child = childNodes.item(i); if (child.getNodeType() == Node.TEXT_NODE) { Assert.assertEquals(child.getTextContent().trim(), ""); } else if (child.getNodeType() == Node.ELEMENT_NODE) { Assert.assertEquals(child, nodeList.item(0)); } else { Assert.fail("Unexpected Node encountered"); } } } //done encryption; now test decryption: { String action = WSHandlerConstants.ENCRYPT; doInboundSecurityWithWSS4J(documentBuilderFactory.newDocumentBuilder().parse(new ByteArrayInputStream(baos.toByteArray())), action); } } }