Add asymmetric encryption support to the XMLSecurity component
--------------------------------------------------------------
Key: CAMEL-4061
URL: https://issues.apache.org/jira/browse/CAMEL-4061
Project: Camel
Issue Type: Improvement
Reporter: Rich Newcomb
Enhance the camel-xmlsecurity data format to support asymmetric key encryption
algorithms.
This enhancement provides the following capabilities:
1. Expands the xmlsecurity data format API with a public method that accepts a
key transport algorithm and recipient key alias
2. Supports the RSA 1.5 and RSA OAEP asymmetric key encryption algorithms
3. Alternatively allows the recipient public key alias to be defined within a
message exchange or in camel context
4. Allows key store and trust store information to be defined in the camel
context
Example configuration:
{code}
// context properties for encryption
contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_URL,
getClass().getClassLoader().getResource("sender.ts").toString());
contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_PASSWORD,
"password");
contextProps.put(XMLSecurityDataFormat.XML_ENC_RECIPIENT_ALIAS, "recipient");
// context properties for decryption
contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_URL,
getClass().getClassLoader().getResource("recipient.ks").toString());
contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_PASSWORD, "password");
contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_ALIAS, "recipient");
context.addRoutes(new RouteBuilder() {
public void configure() {
from("direct:start")
.marshal().secureXML("//privatenode", true, "some-pub-key-alias",
XMLCipher.AES_256, XMLCipher.RSA_v1dot5).to("mock:encrypted")
.unmarshal().secureXML("//privatenode", true,
"somet-pub-key-alias",XMLCipher.AES_256,XMLCipher.RSA_v1dot5).to("mock:decrypted")
}
});
{code}
--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira