[ 
https://issues.apache.org/jira/browse/CAMEL-4061?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13046245#comment-13046245
 ] 

Hadrian Zbarcea commented on CAMEL-4061:
----------------------------------------

Rich, thanks for the patch. I applied the camel-core part, I am testing the 
second one now and will commit shortly. Thanks again, and keep them coming.

> Add asymmetric encryption support to the XMLSecurity component
> --------------------------------------------------------------
>
>                 Key: CAMEL-4061
>                 URL: https://issues.apache.org/jira/browse/CAMEL-4061
>             Project: Camel
>          Issue Type: Improvement
>            Reporter: Rich Newcomb
>         Attachments: 2011.06.06-CAMEL-4061-camel-core-2.7.x.patch, 
> 2011.06.06-CAMEL-4061-xmlsecurity-2.7.x.patch, recipient.ks, sender.ts
>
>
> Enhance the camel-xmlsecurity data format to support asymmetric key 
> encryption algorithms.
> This enhancement provides the following capabilities:
> 1. Expands the xmlsecurity data format API with a public method that accepts 
> a key transport algorithm and recipient key alias
> 2. Supports the RSA 1.5 and RSA OAEP asymmetric key encryption algorithms
> 3. Alternatively allows the recipient public key alias to be defined within a 
> message exchange or in camel context
> 4. Allows key store and trust store information to be defined in the camel 
> context
> Example configuration:
> {code}
> // context properties for encryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_URL, 
> getClass().getClassLoader().getResource("sender.ts").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_PASSWORD, 
> "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_RECIPIENT_ALIAS, "recipient");
>       
> // context properties for decryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_URL, 
> getClass().getClassLoader().getResource("recipient.ks").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_PASSWORD, 
> "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_ALIAS, "recipient");
>     
> context.addRoutes(new RouteBuilder() {          
>   public void configure() {
>     from("direct:start")
>      .marshal().secureXML("//privatenode", true, "some-pub-key-alias", 
> XMLCipher.AES_256, XMLCipher.RSA_v1dot5).to("mock:encrypted")
>      .unmarshal().secureXML("//privatenode", true, 
> "somet-pub-key-alias",XMLCipher.AES_256,XMLCipher.RSA_v1dot5).to("mock:decrypted")
>              
>   }
> });
> {code}
>  

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to