[
https://issues.apache.org/jira/browse/CAMEL-4061?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Work on CAMEL-4061 started by Hadrian Zbarcea.
> Add asymmetric encryption support to the XMLSecurity component
> --------------------------------------------------------------
>
> Key: CAMEL-4061
> URL: https://issues.apache.org/jira/browse/CAMEL-4061
> Project: Camel
> Issue Type: Improvement
> Reporter: Rich Newcomb
> Assignee: Hadrian Zbarcea
> Attachments: 2011.06.06-CAMEL-4061-camel-core-2.7.x.patch,
> 2011.06.06-CAMEL-4061-xmlsecurity-2.7.x.patch, recipient.ks, sender.ts
>
>
> Enhance the camel-xmlsecurity data format to support asymmetric key
> encryption algorithms.
> This enhancement provides the following capabilities:
> 1. Expands the xmlsecurity data format API with a public method that accepts
> a key transport algorithm and recipient key alias
> 2. Supports the RSA 1.5 and RSA OAEP asymmetric key encryption algorithms
> 3. Alternatively allows the recipient public key alias to be defined within a
> message exchange or in camel context
> 4. Allows key store and trust store information to be defined in the camel
> context
> Example configuration:
> {code}
> // context properties for encryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_URL,
> getClass().getClassLoader().getResource("sender.ts").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_TRUST_STORE_PASSWORD,
> "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_RECIPIENT_ALIAS, "recipient");
>
> // context properties for decryption
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_URL,
> getClass().getClassLoader().getResource("recipient.ks").toString());
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_PASSWORD,
> "password");
> contextProps.put(XMLSecurityDataFormat.XML_ENC_KEY_STORE_ALIAS, "recipient");
>
> context.addRoutes(new RouteBuilder() {
> public void configure() {
> from("direct:start")
> .marshal().secureXML("//privatenode", true, "some-pub-key-alias",
> XMLCipher.AES_256, XMLCipher.RSA_v1dot5).to("mock:encrypted")
> .unmarshal().secureXML("//privatenode", true,
> "somet-pub-key-alias",XMLCipher.AES_256,XMLCipher.RSA_v1dot5).to("mock:decrypted")
>
> }
> });
> {code}
>
--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira