camel-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Claus Ibsen (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (CAMEL-4061) Add asymmetric encryption support to the XMLSecurity component
Date Sat, 11 Jun 2011 17:38:58 GMT

    [ https://issues.apache.org/jira/browse/CAMEL-4061?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13047955#comment-13047955
] 

Claus Ibsen commented on CAMEL-4061:
------------------------------------

Did the 2nd patch ever get committed? 

> Add asymmetric encryption support to the XMLSecurity component
> --------------------------------------------------------------
>
>                 Key: CAMEL-4061
>                 URL: https://issues.apache.org/jira/browse/CAMEL-4061
>             Project: Camel
>          Issue Type: Improvement
>            Reporter: Rich Newcomb
>            Assignee: Hadrian Zbarcea
>         Attachments: 2011.06.06-CAMEL-4061-camel-core-2.7.x.patch, 2011.06.06-CAMEL-4061-xmlsecurity-2.7.x.patch,
recipient.ks, sender.ts
>
>
> Enhance the camel-xmlsecurity data format to support asymmetric key encryption algorithms.
> This enhancement provides the following capabilities:
> 1. Expands the xmlsecurity data format API with a public method that accepts a key transport
algorithm and recipient key alias
> 2. Supports the RSA 1.5 and RSA OAEP asymmetric key encryption algorithms
> 3. Alternatively allows the recipient public key alias to be defined within a message
exchange or in camel context
> 4. Allows key store and trust store information to be defined in the camel context
> Example configuration:
> {code}
> // context properties for encryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_URL, getClass().getClassLoader().getResource("sender.ts").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_PASSWORD, "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_RECIPIENT_ALIAS, "recipient");
>     	
> // context properties for decryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_URL, getClass().getClassLoader().getResource("recipient.ks").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_PASSWORD, "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_ALIAS, "recipient");
>     
> context.addRoutes(new RouteBuilder() {	  
>   public void configure() {
>     from("direct:start")
>      .marshal().secureXML("//privatenode", true, "some-pub-key-alias", XMLCipher.AES_256,
XMLCipher.RSA_v1dot5).to("mock:encrypted")
>      .unmarshal().secureXML("//privatenode", true, "somet-pub-key-alias",XMLCipher.AES_256,XMLCipher.RSA_v1dot5).to("mock:decrypted")
            
>   }
> });
> {code}
>  

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message