camel-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r929052 [2/2] - in /websites/production/camel/content: book-dataformat-appendix.html book-in-one-page.html cache/main.pageCache camel-2150-release.html xmlsecurity-dataformat.html
Date Thu, 13 Nov 2014 11:20:48 GMT
Modified: websites/production/camel/content/xmlsecurity-dataformat.html
==============================================================================
--- websites/production/camel/content/xmlsecurity-dataformat.html (original)
+++ websites/production/camel/content/xmlsecurity-dataformat.html Thu Nov 13 11:20:48 2014
@@ -85,66 +85,14 @@
 	<tbody>
         <tr>
         <td valign="top" width="100%">
-<div class="wiki-content maincontent"><h2 id="XMLSecurityDataFormat-XMLSecurityDataFormat">XMLSecurity
Data Format</h2>
-
-<p>The XMLSecurity Data Format facilitates encryption and decryption of XML payloads
at the Document, Element, and Element Content levels (including simultaneous multi-node encryption/decryption
using XPath). To sign messages using the XML Signature specification, please see the Camel
XML Security <a shape="rect" href="xml-security-component.html">component</a>.</p>
-
-<p>The encryption capability is based on formats supported using the Apache XML Security
(Santuario) project. Symmetric encryption/decryption is currently supported using Triple-DES
and AES (128, 192, and 256) encryption formats. Additional formats can be easily added later
as needed. This capability allows Camel users to encrypt/decrypt payloads while being dispatched
or received along a route.</p>
-
-<p><strong>Available as of Camel 2.9</strong><br clear="none">
-The XMLSecurity Data Format supports asymmetric key encryption. In this encryption model
a symmetric key is generated and used to perform XML content encryption or decryption. This
"content encryption key" is then itself encrypted using an asymmetric encryption algorithm
that leverages the recipient's public key as the "key encryption key". Use of an asymmetric
key encryption algorithm ensures that only the holder of the recipient's private key can access
the generated symmetric encryption key. Thus, only the private key holder can decode the message.
The XMLSecurity Data Format handles all of the logic required to encrypt and decrypt the message
content and encryption key(s) using asymmetric key encryption.</p>
-
-<p>The XMLSecurity Data Format also has improved support for namespaces when processing
the XPath queries that select content for encryption. A namespace definition mapping can be
included as part of the data format configuration. This enables true namespace matching, even
if the prefix values in the XPath query and the target xml document are not equivalent strings.</p>
-
-<h3 id="XMLSecurityDataFormat-BasicOptions">Basic Options</h3>
-
-<div class="table-wrap"><table class="confluenceTable"><tbody><tr><th
colspan="1" rowspan="1" class="confluenceTh"><p> Option </p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p> Default </p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p> Description </p></th></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>secureTag</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> <code>null</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> The
XPath reference to the XML Element selected for encryption/decryption. If no tag is specified,
the entire payload is encrypted/decrypted. </p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>secureTagContents</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> <code>false</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> A boolean
value to specify whether the XML Element is to be encrypted or the contents of the XML Element
 </p>
-<ul><li><code>false</code> = Element Level</li><li><code>true</code>
= Element Content Level</li></ul>
-</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>passPhrase</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>null</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
A String used as passPhrase to encrypt/decrypt content. The passPhrase has to be provided.
If no passPhrase is specified, a default passPhrase is used. The passPhrase needs to be put
together in conjunction with the appropriate encryption algorithm. For example using <code>TRIPLEDES</code>
the passPhase can be a <code>"Only another 24 Byte key"</code> </p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>xmlCipherAlgorithm</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> <code>TRIPLEDES</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> The
cipher algorithm to be used for encryption/decryption of the XML message content. The available
choices are:</p>
-<ul><li><code>XMLCipher.TRIPLEDES</code></li><li><code>XMLCipher.AES_128</code></li><li><code>XMLCipher.AES_128_GCM</code>
<strong>Camel 2.12</strong></li><li><code>XMLCipher.AES_192</code></li><li><code>XMLCipher.AES_192_GCM</code>
<strong>Camel 2.12</strong></li><li><code>XMLCipher.AES_256</code></li><li><code>XMLCipher.AES_256_GCM</code>
<strong>Camel 2.12</strong></li></ul>
-</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>namespaces</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>null</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
A map of namespace values indexed by prefix. The index values must match the prefixes used
in the <code>secureTag</code> XPath query. </p></td></tr></tbody></table></div>
-
-
-<h3 id="XMLSecurityDataFormat-AsymmetricEncryptionOptions">Asymmetric Encryption Options</h3>
-
-<p>These options can be applied in addition to relevant the Basic options to use asymmetric
key encryption.  </p>
-
-<div class="table-wrap"><table class="confluenceTable"><tbody><tr><th
colspan="1" rowspan="1" class="confluenceTh"><p> Option </p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p> Default </p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p> Description </p></th></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>recipientKeyAlias</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> <code>null</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> The
key alias to be used when retrieving the recipient's public or private key from a KeyStore
when performing asymmetric key encryption or decryption. </p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>keyCipherAlgorithm</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> <strong>Camel
2.12</strong> <code>XMLCipher.RSA_OAEP</code> </p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p> The cipher algorithm to be used
for encrypti
 on/decryption of the asymmetric key. The available choices are: </p>
-<ul><li><code>XMLCipher.RSA_v1dot5</code></li><li><code>XMLCipher.RSA_OAEP</code></li><li><code>XMLCipher.RSA_OAEP_11</code></li></ul>
-</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>keyOrTrustStoreParameters</code> </p></td><td colspan="1"
rowspan="1" class="confluenceTd"><p> <code>null</code> </p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p> Configuration options for creating
and loading a KeyStore instance that represents the sender's trustStore or recipient's keyStore.
</p></td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>keyPassword</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>null</code> </p></td><td colspan="1" rowspan="1" class="confluenceTd"><p>
<strong>Camel 2.10.2 / 2.11:</strong> The password to be used for retrieving the
private key from the KeyStore. This key is used for asymmetric decryption. </p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p> <code>digestAlgorithm</code>
</p></td><td colspan="1" rowspan="1" class="confluenceTd"><p> XMLCipher.SHA1
</p></td><td colspan="1" rowspan="1" class="co
 nfluenceTd"><p> <strong>Camel 2.12</strong> The digest algorithm to
use with the RSA OAEP algorithm. The available choices are:</p>
-<ul><li><code>XMLCipher.SHA1</code></li><li><code>XMLCipher.SHA256</code></li><li><code>XMLCipher.SHA512</code></li></ul>
-</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p>
<code>mgfAlgorithm</code> </p></td><td colspan="1" rowspan="1"
class="confluenceTd"><p> EncryptionConstants.MGF1_SHA1 </p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p> <strong>Camel 2.12</strong>
The MGF Algorithm to use with the RSA OAEP algorithm. The available choices are:</p>
-<ul><li><code>EncryptionConstants.MGF1_SHA1</code></li><li><code>EncryptionConstants.MGF1_SHA256</code></li><li><code>EncryptionConstants.MGF1_SHA512</code></li></ul>
-</td></tr></tbody></table></div>
-
-
-<h4 id="XMLSecurityDataFormat-KeyCipherAlgorithm">Key Cipher Algorithm</h4>
-
-<p>As of Camel 2.12.0, the default Key Cipher Algorithm is now XMLCipher.RSA_OAEP instead
of XMLCipher.RSA_v1dot5. Usage of XMLCipher.RSA_v1dot5 is discouraged due to various attacks.
Requests that use RSA v1.5 as the key cipher algorithm will be rejected unless it has been
explicitly configured as the key cipher algorithm.</p>
-
-<h3 id="XMLSecurityDataFormat-Marshal">Marshal</h3>
-<p>In order to encrypt the payload, the <code>marshal</code> processor
needs to be applied on the route followed by the <strong><code>secureXML()</code></strong>
tag.</p>
-
-<h3 id="XMLSecurityDataFormat-Unmarshal">Unmarshal</h3>
-<p>In order to decrypt the payload, the <code>unmarshal</code> processor
needs to be applied on the route followed by the <strong><code>secureXML()</code></strong>
tag.</p>
-
-<h3 id="XMLSecurityDataFormat-Examples">Examples</h3>
-<p>Given below are several examples of how marshalling could be performed at the Document,
Element, and Content levels.</p>
-
-<h4 id="XMLSecurityDataFormat-FullPayloadencryption/decryption">Full Payload encryption/decryption</h4>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-from(&quot;direct:start&quot;)
+<div class="wiki-content maincontent"><h2 id="XMLSecurityDataFormat-XMLSecurityDataFormat">XMLSecurity
Data Format</h2><p>The XMLSecurity Data Format facilitates encryption and decryption
of XML payloads at the Document, Element, and Element Content levels (including simultaneous
multi-node encryption/decryption using XPath). To sign messages using the XML Signature specification,
please see the Camel XML Security <a shape="rect" href="xml-security-component.html">component</a>.</p><p>The
encryption capability is based on formats supported using the Apache XML Security (Santuario)
project. Symmetric encryption/decryption is currently supported using Triple-DES and AES (128,
192, and 256) encryption formats. Additional formats can be easily added later as needed.
This capability allows Camel users to encrypt/decrypt payloads while being dispatched or received
along a route.</p><p><strong>Available as of Camel 2.9</strong><br
clear="none"> The XMLSecurity Data Format supports asymmetr
 ic key encryption. In this encryption model a symmetric key is generated and used to perform
XML content encryption or decryption. This "content encryption key" is then itself encrypted
using an asymmetric encryption algorithm that leverages the recipient's public key as the
"key encryption key". Use of an asymmetric key encryption algorithm ensures that only the
holder of the recipient's private key can access the generated symmetric encryption key. Thus,
only the private key holder can decode the message. The XMLSecurity Data Format handles all
of the logic required to encrypt and decrypt the message content and encryption key(s) using
asymmetric key encryption.</p><p>The XMLSecurity Data Format also has improved
support for namespaces when processing the XPath queries that select content for encryption.
A namespace definition mapping can be included as part of the data format configuration. This
enables true namespace matching, even if the prefix values in the XPath query and the
  target xml document are not equivalent strings.</p><h3 id="XMLSecurityDataFormat-BasicOptions">Basic
Options</h3><div class="table-wrap"><table class="confluenceTable"><tbody><tr><th
colspan="1" rowspan="1" class="confluenceTh"><p>Option</p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p>Default</p></th><th
colspan="1" rowspan="1" class="confluenceTh"><p>Description</p></th></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>secureTag</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>null</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>The XPath reference to the XML Element
selected for encryption/decryption. If no tag is specified, the entire payload is encrypted/decrypted.</p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>secureTagContents</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>false</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>A boole
 an value to specify whether the XML Element is to be encrypted or the contents of the XML
Element</p><ul><li><code>false</code> = Element Level</li><li><code>true</code>
= Element Content Level</li></ul></td></tr><tr><td colspan="1"
rowspan="1" class="confluenceTd"><p><code>passPhrase</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>null</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>A String used as passPhrase to encrypt/decrypt
content. The passPhrase has to be provided. If no passPhrase is specified, a default passPhrase
is used. The passPhrase needs to be put together in conjunction with the appropriate encryption
algorithm. For example using <code>TRIPLEDES</code> the passPhase can be a <code>"Only
another 24 Byte key"</code></p></td></tr><tr><td colspan="1"
rowspan="1" class="confluenceTd"><p><code>xmlCipherAlgorithm</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>TRIPLEDES</code></p></td><td
colspan="1" rows
 pan="1" class="confluenceTd"><p>The cipher algorithm to be used for encryption/decryption
of the XML message content. The available choices are:</p><ul><li><code>XMLCipher.TRIPLEDES</code></li><li><code>XMLCipher.AES_128</code></li><li><code>XMLCipher.AES_128_GCM</code>
<strong>Camel 2.12</strong></li><li><code>XMLCipher.AES_192</code></li><li><code>XMLCipher.AES_192_GCM</code>
<strong>Camel 2.12</strong></li><li><code>XMLCipher.AES_256</code></li><li><code>XMLCipher.AES_256_GCM</code>
<strong>Camel 2.12</strong></li><li>XMLCipher.SEED_128 <strong>Camel
2.12</strong></li><li>XMLCipher.CAMELLIA_128, XMLCipher.CAMELLIA_192, XMLCipher.CAMELLIA_256
<strong>Camel 2.12</strong></li></ul></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>namespaces</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>null</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>A map of namespace values indexed
by prefix. The index values must match the pr
 efixes used in the <code>secureTag</code> XPath query.</p></td></tr></tbody></table></div><h3
id="XMLSecurityDataFormat-AsymmetricEncryptionOptions">Asymmetric Encryption Options</h3><p>These
options can be applied in addition to relevant the Basic options to use asymmetric key encryption.</p><div
class="table-wrap"><table class="confluenceTable"><tbody><tr><th colspan="1"
rowspan="1" class="confluenceTh"><p>Option</p></th><th colspan="1"
rowspan="1" class="confluenceTh"><p>Default</p></th><th colspan="1"
rowspan="1" class="confluenceTh"><p>Description</p></th></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>recipientKeyAlias</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>null</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>The key alias to be used when retrieving
the recipient's public or private key from a KeyStore when performing asymmetric key encryption
or decryption.</p></td></tr><tr><td colspan="1" rowspan="1" cla
 ss="confluenceTd"><p><code>keyCipherAlgorithm</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><strong>Camel 2.12</strong>
<code>XMLCipher.RSA_OAEP</code></p></td><td colspan="1" rowspan="1"
class="confluenceTd"><p>The cipher algorithm to be used for encryption/decryption
of the asymmetric key. The available choices are:</p><ul><li><code>XMLCipher.RSA_v1dot5</code></li><li><code>XMLCipher.RSA_OAEP</code></li><li><code>XMLCipher.RSA_OAEP_11</code></li></ul></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>keyOrTrustStoreParameters</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>null</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>Configuration options for creating
and loading a KeyStore instance that represents the sender's trustStore or recipient's keyStore.</p></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>keyPassword</code></p></td><td
colspan="1" rowspan="1" class="conflue
 nceTd"><p><code>null</code></p></td><td colspan="1" rowspan="1"
class="confluenceTd"><p><strong>Camel 2.10.2 / 2.11:</strong> The password
to be used for retrieving the private key from the KeyStore. This key is used for asymmetric
decryption.</p></td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"><p><code>digestAlgorithm</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>XMLCipher.SHA1</p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><strong>Camel 2.12</strong>
The digest algorithm to use with the RSA OAEP algorithm. The available choices are:</p><ul><li><code>XMLCipher.SHA1</code></li><li><code>XMLCipher.SHA256</code></li><li><code>XMLCipher.SHA512</code></li></ul></td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"><p><code>mgfAlgorithm</code></p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p>EncryptionConstants.MGF1_SHA1</p></td><td
colspan="1" rowspan="1" class="confluenceTd"><p><strong>Camel 2.12</strong>
The MGF Algori
 thm to use with the RSA OAEP algorithm. The available choices are:</p><ul><li><code>EncryptionConstants.MGF1_SHA1</code></li><li><code>EncryptionConstants.MGF1_SHA256</code></li><li><code>EncryptionConstants.MGF1_SHA512</code></li></ul></td></tr></tbody></table></div><h4
id="XMLSecurityDataFormat-KeyCipherAlgorithm">Key Cipher Algorithm</h4><p>As
of Camel 2.12.0, the default Key Cipher Algorithm is now XMLCipher.RSA_OAEP instead of XMLCipher.RSA_v1dot5.
Usage of XMLCipher.RSA_v1dot5 is discouraged due to various attacks. Requests that use RSA
v1.5 as the key cipher algorithm will be rejected unless it has been explicitly configured
as the key cipher algorithm.</p><h3 id="XMLSecurityDataFormat-Marshal">Marshal</h3><p>In
order to encrypt the payload, the <code>marshal</code> processor needs to be applied
on the route followed by the <strong><code>secureXML()</code></strong>
tag.</p><h3 id="XMLSecurityDataFormat-Unmarshal">Unmarshal</h3><p>In
order to decrypt the payload, the <code>unm
 arshal</code> processor needs to be applied on the route followed by the <strong><code>secureXML()</code></strong>
tag.</p><h3 id="XMLSecurityDataFormat-Examples">Examples</h3><p>Given
below are several examples of how marshalling could be performed at the Document, Element,
and Content levels.</p><h4 id="XMLSecurityDataFormat-FullPayloadencryption/decryption">Full
Payload encryption/decryption</h4><div class="code panel pdl" style="border-width:
1px;"><div class="codeContent panelContent pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[from(&quot;direct:start&quot;)
     .marshal().secureXML()
     .unmarshal().secureXML()
     .to(&quot;direct:end&quot;);
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryption">Partial
Payload Content Only encryption/decryption</h4>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-String tagXPATH = &quot;//cheesesites/italy/cheese&quot;;
+</div></div><h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryption">Partial
Payload Content Only encryption/decryption</h4><div class="code panel pdl" style="border-width:
1px;"><div class="codeContent panelContent pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[String
tagXPATH = &quot;//cheesesites/italy/cheese&quot;;
 boolean secureTagContent = true;
 ...
 from(&quot;direct:start&quot;)
@@ -152,12 +100,8 @@ from(&quot;direct:start&quot;)
     .unmarshal().secureXML(tagXPATH, secureTagContent)
     .to(&quot;direct:end&quot;);
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-PartialMultiNodePayloadContentOnlyencryption/decryption">Partial
Multi Node Payload Content Only encryption/decryption</h4>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-String tagXPATH = &quot;//cheesesites/*/cheese&quot;;
+</div></div><h4 id="XMLSecurityDataFormat-PartialMultiNodePayloadContentOnlyencryption/decryption">Partial
Multi Node Payload Content Only encryption/decryption</h4><div class="code panel
pdl" style="border-width: 1px;"><div class="codeContent panelContent pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[String
tagXPATH = &quot;//cheesesites/*/cheese&quot;;
 boolean secureTagContent = true;
 ...
 from(&quot;direct:start&quot;)
@@ -165,12 +109,8 @@ from(&quot;direct:start&quot;)
     .unmarshal().secureXML(tagXPATH, secureTagContent)
     .to(&quot;direct:end&quot;);
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryptionwithchoiceofpassPhrase(password)">Partial
Payload Content Only encryption/decryption with choice of passPhrase(password)</h4>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-String tagXPATH = &quot;//cheesesites/italy/cheese&quot;;
+</div></div><h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryptionwithchoiceofpassPhrase(password)">Partial
Payload Content Only encryption/decryption with choice of passPhrase(password)</h4><div
class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[String
tagXPATH = &quot;//cheesesites/italy/cheese&quot;;
 boolean secureTagContent = true;
 ...
 String passPhrase = &quot;Just another 24 Byte key&quot;;
@@ -179,12 +119,8 @@ from(&quot;direct:start&quot;)
     .unmarshal().secureXML(tagXPATH, secureTagContent, passPhrase)
     .to(&quot;direct:end&quot;);
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryptionwithpassPhrase(password)andAlgorithm">Partial
Payload Content Only encryption/decryption with passPhrase(password) and Algorithm</h4>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-import org.apache.xml.security.encryption.XMLCipher;
+</div></div><h4 id="XMLSecurityDataFormat-PartialPayloadContentOnlyencryption/decryptionwithpassPhrase(password)andAlgorithm">Partial
Payload Content Only encryption/decryption with passPhrase(password) and Algorithm</h4><div
class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[import
org.apache.xml.security.encryption.XMLCipher;
 ....
 String tagXPATH = &quot;//cheesesites/italy/cheese&quot;;
 boolean secureTagContent = true;
@@ -195,13 +131,8 @@ from(&quot;direct:start&quot;)
     .unmarshal().secureXML(tagXPATH, secureTagContent, passPhrase, algorithm)
     .to(&quot;direct:end&quot;);
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-PartialPayloadContentwithNamespacesupport">Partial Payload
Content with Namespace support</h4>
-<h5 id="XMLSecurityDataFormat-JavaDSL">Java DSL</h5>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[
-final Map&lt;String, String&gt; namespaces = new HashMap&lt;String, String&gt;();
+</div></div><h4 id="XMLSecurityDataFormat-PartialPayloadContentwithNamespacesupport">Partial
Payload Content with Namespace support</h4><h5 id="XMLSecurityDataFormat-JavaDSL">Java
DSL</h5><div class="code panel pdl" style="border-width: 1px;"><div class="codeContent
panelContent pdl">
+<script class="theme: Default; brush: java; gutter: false" type="syntaxhighlighter"><![CDATA[final
Map&lt;String, String&gt; namespaces = new HashMap&lt;String, String&gt;();
 namespaces.put(&quot;cust&quot;, &quot;http://cheese.xmlsecurity.camel.apache.org/&quot;);
 
 final KeyStoreParameters tsParameters = new KeyStoreParameters();
@@ -217,13 +148,8 @@ context.addRoutes(new RouteBuilder() {
     }
 }
 ]]></script>
-</div></div>
-
-<h5 id="XMLSecurityDataFormat-SpringXML">Spring XML</h5>
-<p>A namespace prefix that is defined as part of the <code>camelContext</code>
definition can be re-used in context within the data format <code>secureTag</code>
attribute of the <code>secureXML</code> element.</p>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: xml; gutter: false" type="syntaxhighlighter"><![CDATA[
-&lt;camelContext id=&quot;springXmlSecurityDataFormatTestCamelContext&quot; 
+</div></div><h5 id="XMLSecurityDataFormat-SpringXML">Spring XML</h5><p>A
namespace prefix that is defined as part of the <code>camelContext</code> definition
can be re-used in context within the data format <code>secureTag</code> attribute
of the <code>secureXML</code> element.</p><div class="code panel pdl"
style="border-width: 1px;"><div class="codeContent panelContent pdl">
+<script class="theme: Default; brush: xml; gutter: false" type="syntaxhighlighter"><![CDATA[&lt;camelContext
id=&quot;springXmlSecurityDataFormatTestCamelContext&quot; 
               xmlns=&quot;http://camel.apache.org/schema/spring&quot;
               xmlns:cheese=&quot;http://cheese.xmlsecurity.camel.apache.org/&quot;&gt;
       
     &lt;route&gt;
@@ -234,13 +160,8 @@ context.addRoutes(new RouteBuilder() {
             &lt;/marshal&gt; 
             ...
 ]]></script>
-</div></div>
-
-<h4 id="XMLSecurityDataFormat-AsymmetricKeyEncryption">Asymmetric Key Encryption</h4>
-<h5 id="XMLSecurityDataFormat-SpringXMLSender">Spring XML Sender</h5>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
-<script class="theme: Default; brush: xml; gutter: false" type="syntaxhighlighter"><![CDATA[
-&lt;!--  trust store configuration --&gt;                          
+</div></div><h4 id="XMLSecurityDataFormat-AsymmetricKeyEncryption">Asymmetric
Key Encryption</h4><h5 id="XMLSecurityDataFormat-SpringXMLSender">Spring XML Sender</h5><div
class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
+<script class="theme: Default; brush: xml; gutter: false" type="syntaxhighlighter"><![CDATA[&lt;!--
 trust store configuration --&gt;                          
 &lt;camel:keyStoreParameters id=&quot;trustStoreParams&quot; resource=&quot;./sender.ts&quot;
password=&quot;password&quot;/&gt;
 
 &lt;camelContext id=&quot;springXmlSecurityDataFormatTestCamelContext&quot; 
@@ -258,10 +179,7 @@ context.addRoutes(new RouteBuilder() {
             &lt;/marshal&gt; 
             ...
 ]]></script>
-</div></div>
-
-<h5 id="XMLSecurityDataFormat-SpringXMLRecipient">Spring XML Recipient</h5>
-<div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent
pdl">
+</div></div><h5 id="XMLSecurityDataFormat-SpringXMLRecipient">Spring XML
Recipient</h5><div class="code panel pdl" style="border-width: 1px;"><div class="codeContent
panelContent pdl">
 <script class="theme: Default; brush: xml; gutter: false" type="syntaxhighlighter"><![CDATA[

 &lt;!--  key store configuration --&gt;
 &lt;camel:keyStoreParameters id=&quot;keyStoreParams&quot; resource=&quot;./recipient.ks&quot;
password=&quot;password&quot; /&gt;
@@ -282,11 +200,7 @@ context.addRoutes(new RouteBuilder() {
             &lt;/unmarshal&gt;
             ...
 ]]></script>
-</div></div>
-
-<h3 id="XMLSecurityDataFormat-Dependencies">Dependencies</h3>
-
-<p>This data format is provided within the <strong>camel-xmlsecurity</strong>
component.</p></div>
+</div></div><h3 id="XMLSecurityDataFormat-Dependencies">Dependencies</h3><p>This
data format is provided within the <strong>camel-xmlsecurity</strong> component.</p></div>
         </td>
         <td valign="top">
           <div class="navigation">



Mime
View raw message