Signature coverage of signed XML Encryption elements created using standard 
WSS4J elements cannot be verified with WS-SP configuration or the 
CryptoCoverageChecker
-------------------------------------------------------------------------------------------------------------------------------------------------------------------

                 Key: CXF-2963
                 URL: https://issues.apache.org/jira/browse/CXF-2963
             Project: CXF
          Issue Type: Bug
          Components: WS-* Components
    Affects Versions: 2.2.10, 2.3
            Reporter: David Valeri
            Priority: Minor


When using manual configuration of WSS4J on the client outbound interceptor 
chain, the resulting message contains extraneous Id attributes on the signed 
XML Encryption elements.  The signature is computed using a different attribute 
value than that reported by the encryption results from WSS4J on the server 
side.

For instance, the following signed element is referenced in different ways:

<xenc:EncryptedData 
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd";
 xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"; Id="EncDataId-659" 
Type="http://www.w3.org/2001/04/xmlenc#Element"; wsu:Id="id-663">

Signature: <ds:Reference URI="#id-663">
Encryption: <xenc:DataReference URI="#EncDataId-659" />

The extra ID invalidates the XML Encryption schema and troubles the logic that 
determines signed encrypted content.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to