From 52075630df265b3a867801b58d8f80170d0dcdd0 Mon Sep 17 00:00:00 2001
From: Thomas Lenz
Date: Wed, 6 Aug 2025 12:06:46 +0200
Subject: chore(core): update IAIK libs and clean-up old
---
moaSig/libs/iaik_cms-6.0_moa.jar | Bin 501606 -> 0 bytes
moaSig/libs/iaik_cms-6.1_moa.jar | Bin 0 -> 413434 bytes
moaSig/libs/iaik_eccelerate-6.3.0_eval.jar | Bin 807993 -> 0 bytes
moaSig/libs/iaik_eccelerate-6.3.2_eval.jar | Bin 0 -> 806569 bytes
moaSig/libs/iaik_eccelerate_addon-6.3.0_eval.jar | Bin 98152 -> 0 bytes
moaSig/libs/iaik_eccelerate_addon-6.3.2_eval.jar | Bin 0 -> 96721 bytes
6 files changed, 0 insertions(+), 0 deletions(-)
delete mode 100644 moaSig/libs/iaik_cms-6.0_moa.jar
create mode 100644 moaSig/libs/iaik_cms-6.1_moa.jar
delete mode 100644 moaSig/libs/iaik_eccelerate-6.3.0_eval.jar
create mode 100644 moaSig/libs/iaik_eccelerate-6.3.2_eval.jar
delete mode 100644 moaSig/libs/iaik_eccelerate_addon-6.3.0_eval.jar
create mode 100644 moaSig/libs/iaik_eccelerate_addon-6.3.2_eval.jar
(limited to 'moaSig/libs')
diff --git a/moaSig/libs/iaik_cms-6.0_moa.jar b/moaSig/libs/iaik_cms-6.0_moa.jar
deleted file mode 100644
index f11b250..0000000
Binary files a/moaSig/libs/iaik_cms-6.0_moa.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_cms-6.1_moa.jar b/moaSig/libs/iaik_cms-6.1_moa.jar
new file mode 100644
index 0000000..8f5b167
Binary files /dev/null and b/moaSig/libs/iaik_cms-6.1_moa.jar differ
diff --git a/moaSig/libs/iaik_eccelerate-6.3.0_eval.jar b/moaSig/libs/iaik_eccelerate-6.3.0_eval.jar
deleted file mode 100644
index 4422430..0000000
Binary files a/moaSig/libs/iaik_eccelerate-6.3.0_eval.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_eccelerate-6.3.2_eval.jar b/moaSig/libs/iaik_eccelerate-6.3.2_eval.jar
new file mode 100644
index 0000000..7cf380f
Binary files /dev/null and b/moaSig/libs/iaik_eccelerate-6.3.2_eval.jar differ
diff --git a/moaSig/libs/iaik_eccelerate_addon-6.3.0_eval.jar b/moaSig/libs/iaik_eccelerate_addon-6.3.0_eval.jar
deleted file mode 100644
index 182a150..0000000
Binary files a/moaSig/libs/iaik_eccelerate_addon-6.3.0_eval.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_eccelerate_addon-6.3.2_eval.jar b/moaSig/libs/iaik_eccelerate_addon-6.3.2_eval.jar
new file mode 100644
index 0000000..9216303
Binary files /dev/null and b/moaSig/libs/iaik_eccelerate_addon-6.3.2_eval.jar differ
--
cgit v1.2.3
From f8c9612785af22c55c05708c985c6e7345123c50 Mon Sep 17 00:00:00 2001
From: Thomas Lenz
Date: Wed, 17 Sep 2025 16:55:00 +0200
Subject: chore(core): update IAIK libs
---
moaSig/libs/iaik_cpades-2.4_moa.jar | Bin 130134 -> 0 bytes
moaSig/libs/iaik_cpades_2.5_moa.jar | Bin 0 -> 197841 bytes
moaSig/libs/iaik_cpxlevel-0.9.2.1_moa.jar | Bin 0 -> 139405 bytes
moaSig/libs/iaik_cpxlevel-0.9.2_moa.jar | Bin 139388 -> 0 bytes
moaSig/libs/iaik_moa-2.09.jar | Bin 530620 -> 0 bytes
moaSig/libs/iaik_moa-2.10.jar | Bin 0 -> 535931 bytes
moaSig/libs/iaik_pki_module-2.03_moa.jar | Bin 629542 -> 0 bytes
moaSig/libs/iaik_pki_module-2.04_moa.jar | Bin 0 -> 632493 bytes
moaSig/libs/iaik_sva-1.2.0.jar | Bin 157685 -> 0 bytes
moaSig/libs/iaik_sva-1.2.1-SNAPSHOT.jar | Bin 0 -> 178199 bytes
.../invoke/XMLSignatureVerificationInvoker.java | 59 +++++++++------------
moaSig/moa-sig/build.gradle | 5 +-
.../test/integration/AbstractIntegrationTest.java | 29 +++++-----
.../test/integration/PadesIntegrationTest.java | 23 ++++++--
.../test/integration/XadesIntegrationTest.java | 44 ++++++++-------
15 files changed, 86 insertions(+), 74 deletions(-)
delete mode 100644 moaSig/libs/iaik_cpades-2.4_moa.jar
create mode 100644 moaSig/libs/iaik_cpades_2.5_moa.jar
create mode 100644 moaSig/libs/iaik_cpxlevel-0.9.2.1_moa.jar
delete mode 100644 moaSig/libs/iaik_cpxlevel-0.9.2_moa.jar
delete mode 100644 moaSig/libs/iaik_moa-2.09.jar
create mode 100644 moaSig/libs/iaik_moa-2.10.jar
delete mode 100644 moaSig/libs/iaik_pki_module-2.03_moa.jar
create mode 100644 moaSig/libs/iaik_pki_module-2.04_moa.jar
delete mode 100644 moaSig/libs/iaik_sva-1.2.0.jar
create mode 100644 moaSig/libs/iaik_sva-1.2.1-SNAPSHOT.jar
(limited to 'moaSig/libs')
diff --git a/moaSig/libs/iaik_cpades-2.4_moa.jar b/moaSig/libs/iaik_cpades-2.4_moa.jar
deleted file mode 100644
index 300c215..0000000
Binary files a/moaSig/libs/iaik_cpades-2.4_moa.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_cpades_2.5_moa.jar b/moaSig/libs/iaik_cpades_2.5_moa.jar
new file mode 100644
index 0000000..1c15eec
Binary files /dev/null and b/moaSig/libs/iaik_cpades_2.5_moa.jar differ
diff --git a/moaSig/libs/iaik_cpxlevel-0.9.2.1_moa.jar b/moaSig/libs/iaik_cpxlevel-0.9.2.1_moa.jar
new file mode 100644
index 0000000..2d16719
Binary files /dev/null and b/moaSig/libs/iaik_cpxlevel-0.9.2.1_moa.jar differ
diff --git a/moaSig/libs/iaik_cpxlevel-0.9.2_moa.jar b/moaSig/libs/iaik_cpxlevel-0.9.2_moa.jar
deleted file mode 100644
index e67be71..0000000
Binary files a/moaSig/libs/iaik_cpxlevel-0.9.2_moa.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_moa-2.09.jar b/moaSig/libs/iaik_moa-2.09.jar
deleted file mode 100644
index a73a348..0000000
Binary files a/moaSig/libs/iaik_moa-2.09.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_moa-2.10.jar b/moaSig/libs/iaik_moa-2.10.jar
new file mode 100644
index 0000000..7a659c4
Binary files /dev/null and b/moaSig/libs/iaik_moa-2.10.jar differ
diff --git a/moaSig/libs/iaik_pki_module-2.03_moa.jar b/moaSig/libs/iaik_pki_module-2.03_moa.jar
deleted file mode 100644
index a017fe6..0000000
Binary files a/moaSig/libs/iaik_pki_module-2.03_moa.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_pki_module-2.04_moa.jar b/moaSig/libs/iaik_pki_module-2.04_moa.jar
new file mode 100644
index 0000000..8732262
Binary files /dev/null and b/moaSig/libs/iaik_pki_module-2.04_moa.jar differ
diff --git a/moaSig/libs/iaik_sva-1.2.0.jar b/moaSig/libs/iaik_sva-1.2.0.jar
deleted file mode 100644
index a9d3824..0000000
Binary files a/moaSig/libs/iaik_sva-1.2.0.jar and /dev/null differ
diff --git a/moaSig/libs/iaik_sva-1.2.1-SNAPSHOT.jar b/moaSig/libs/iaik_sva-1.2.1-SNAPSHOT.jar
new file mode 100644
index 0000000..4bb8326
Binary files /dev/null and b/moaSig/libs/iaik_sva-1.2.1-SNAPSHOT.jar differ
diff --git a/moaSig/moa-sig-lib/src/main/java/at/gv/egovernment/moa/spss/server/invoke/XMLSignatureVerificationInvoker.java b/moaSig/moa-sig-lib/src/main/java/at/gv/egovernment/moa/spss/server/invoke/XMLSignatureVerificationInvoker.java
index b97cc95..2973b36 100644
--- a/moaSig/moa-sig-lib/src/main/java/at/gv/egovernment/moa/spss/server/invoke/XMLSignatureVerificationInvoker.java
+++ b/moaSig/moa-sig-lib/src/main/java/at/gv/egovernment/moa/spss/server/invoke/XMLSignatureVerificationInvoker.java
@@ -110,34 +110,27 @@ import iaik.xml.crypto.utils.URIException;
public class XMLSignatureVerificationInvoker {
/** The single instance of this class. */
- private static XMLSignatureVerificationInvoker instance = null;
+ private static final XMLSignatureVerificationInvoker INSTANCE = new XMLSignatureVerificationInvoker();
- private static Set FILTERED_REF_TYPES;
-
- static {
- FILTERED_REF_TYPES = new HashSet();
- FILTERED_REF_TYPES.add(DsigManifest.XML_DSIG_MANIFEST_TYPE);
- FILTERED_REF_TYPES.add(SecurityLayerManifest.SECURITY_LAYER_MANIFEST_TYPE);
- FILTERED_REF_TYPES.add(SecurityLayerManifest.SECURITY_LAYER_MANIFEST_TYPE_OLD);
- FILTERED_REF_TYPES.add(XMLConstants.NAMESPACE_ETSI_STRING + "SignedProperties");
- FILTERED_REF_TYPES.add("http://uri.etsi.org/01903#SignedProperties");
- }
+ private static final Set FILTERED_REF_TYPES = Set.of(
+ DsigManifest.XML_DSIG_MANIFEST_TYPE,
+ SecurityLayerManifest.SECURITY_LAYER_MANIFEST_TYPE,
+ SecurityLayerManifest.SECURITY_LAYER_MANIFEST_TYPE_OLD,
+ XMLConstants.NAMESPACE_ETSI_STRING + "SignedProperties",
+ "http://uri.etsi.org/01903#SignedProperties");
/**
* Get the single instance of this class.
- *
+ *
* @return The single instance of this class.
*/
- public static synchronized XMLSignatureVerificationInvoker getInstance() {
- if (instance == null) {
- instance = new XMLSignatureVerificationInvoker();
- }
- return instance;
+ public static XMLSignatureVerificationInvoker getInstance() {
+ return INSTANCE;
}
/**
* Create a new XMLSignatureCreationInvoker.
- *
+ *
* Protected to disallow multiple instances.
*/
protected XMLSignatureVerificationInvoker() {
@@ -146,8 +139,8 @@ public class XMLSignatureVerificationInvoker {
/**
* Process the VerifyXMLSignatureRequest message and invoke the
* XMLSignatureVerificationModule.
- *
- * @param request A VerifyXMLSignatureRequest API object
+ *
+ * @param request A VerifyXMLSignatureRequest API object
* containing the data for verifying an XML signature.
* @return A VerifyXMLSignatureResponse containing the answert
* to the VerifyXMLSignatureRequest. MOA schema
@@ -307,16 +300,16 @@ public class XMLSignatureVerificationInvoker {
/**
* Checks if the signer certificate matches one of the allowed signer
* certificates specified in the provided trustProfile.
- *
+ *
* @param result The result produced by the
* XMLSignatureVerificationModule.
- *
+ *
* @param trustProfile The trust profile the signer certificate is validated
* against.
- *
+ *
* @return The overal result of the certificate validation for the signer
* certificate.
- *
+ *
* @throws MOAException if one of the signer certificates specified in the
* trustProfile cannot be read from the file
* system.
@@ -392,7 +385,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Select the dsig:Signature DOM element within the signature
* environment.
- *
+ *
* @param signatureEnvironment The signature environment containing the
* dsig:Signature.
* @param request The VerifyXMLSignatureRequest
@@ -425,7 +418,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Build the supplemental data objects contained in the
* VerifyXMLSignatureRequest.
- *
+ *
* @param supplements A List of
* XMLDataObjectAssociations containing the
* supplement data.
@@ -458,7 +451,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Get the supplemental data contained in the
* VerifyXMLSignatureRequest.
- *
+ *
* @param request The VerifyXMLSignatureRequest containing the
* supplemental data.
* @return A List of XMLDataObjectAssociation objects
@@ -490,7 +483,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Perform additional validations of the
* XMLSignatureVerificationResult.
- *
+ *
*
* In particular, it is verified that:
*
@@ -500,7 +493,7 @@ public class XMLSignatureVerificationInvoker {
* - The hash values of the
TransformParameters are valid.
*
*
- *
+ *
* @param request The VerifyXMLSignatureRequest containing the
* signature to verify.
* @param result The result produced by
@@ -605,7 +598,7 @@ public class XMLSignatureVerificationInvoker {
* Get all Transforms contained in all the
* VerifyTransformsInfoProfiles of the given
* ReferenceInfo.
- *
+ *
* @param refInfo The ReferenceInfo object containing the
* transformations.
* @return A List of Lists. Each of the
@@ -637,7 +630,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Build the Set of all TransformParameter URIs.
- *
+ *
* @param transformParameters The List of
* TransformParameters, as provided to
* the verification.
@@ -658,7 +651,7 @@ public class XMLSignatureVerificationInvoker {
/**
* Build a mapping between TransformParameter URIs (a
* String and dsig:HashValue (a byte[]).
- *
+ *
* @param request The VerifyXMLSignatureRequest.
* @return Map The resulting mapping.
* @throws MOAApplicationException An error occurred accessing one of the
@@ -703,7 +696,7 @@ public class XMLSignatureVerificationInvoker {
* Filter the ReferenceInfos returned by the
* VerifyXMLSignatureResult for comparison with the
* ReferenceInfo elements in the request.
- *
+ *
* @param referenceInfos The ReferenceInfos from the
* VerifyXMLSignatureResult.
* @return A List of all ReferenceInfos whose type is
diff --git a/moaSig/moa-sig/build.gradle b/moaSig/moa-sig/build.gradle
index 21bdb2c..1887479 100644
--- a/moaSig/moa-sig/build.gradle
+++ b/moaSig/moa-sig/build.gradle
@@ -21,18 +21,19 @@ dependencies {
jaxb 'com.sun.xml.bind:jaxb-xjc:4.0.5'
jaxb 'org.glassfish.jaxb:jaxb-runtime:4.0.5'
+ compileOnly 'jakarta.servlet:jakarta.servlet-api:6.0.0'
+
implementation project(':common')
implementation project(':moa-sig-lib')
implementation project(':moa-asic')
implementation fileTree(dir: 'libs', include: ['*.jar'])
- compileOnly 'jakarta.servlet:jakarta.servlet-api:6.0.0'
+
implementation 'commons-discovery:commons-discovery:0.5'
implementation 'org.apache.logging.log4j:log4j-1.2-api:2.25.1'
implementation 'org.slf4j:log4j-over-slf4j:2.0.17'
implementation 'jakarta.jws:jakarta.jws-api:3.0.0'
implementation 'jakarta.xml.bind:jakarta.xml.bind-api:4.0.2'
implementation 'ch.qos.logback:logback-classic:1.5.18'
-
implementation 'javax.activation:activation:1.1.1'
implementation 'org.eclipse.angus:angus-mail:2.0.4'
diff --git a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/AbstractIntegrationTest.java b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/AbstractIntegrationTest.java
index 1ee071a..92749b0 100644
--- a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/AbstractIntegrationTest.java
+++ b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/AbstractIntegrationTest.java
@@ -37,7 +37,6 @@ import at.gv.egovernment.moaspss.util.Constants;
import iaik.esi.sva.ConfigurationAdapter;
import iaik.pki.Configurator;
import iaik.pki.PKIFactory;
-import iaik.pki.store.certstore.CertStoreFactory;
import iaik.pki.store.truststore.TrustStoreFactory;
public abstract class AbstractIntegrationTest {
@@ -57,9 +56,9 @@ public abstract class AbstractIntegrationTest {
System.setProperty("moa.spss.server.configuration", "");
System.setProperty("iaik.esi.sva.configuration.location", "");
-
+
TrustStoreFactory.reset();
-
+
// reset TSL client
final Field field1 = TSLServiceFactory.class.getDeclaredField("tslClient");
field1.setAccessible(true);
@@ -68,32 +67,32 @@ public abstract class AbstractIntegrationTest {
final Field field5 = SQLiteDBService.class.getDeclaredField("conn");
field5.setAccessible(true);
field5.set(null, null);
-
+
final Field field6 = DatabaseServiceFactory.class.getDeclaredField("dbServices");
field6.setAccessible(true);
field6.set(null, null);
-
+
// reset MOA-SPSS configuration object
final Field field2 = ConfigurationProvider.class.getDeclaredField("instance");
field2.setAccessible(true);
field2.set(null, null);
-
+
final Field field8 = TransactionContextManager.class.getDeclaredField("instance");
field8.setAccessible(true);
field8.set(null, null);
-
+
// reset PKI module configuration
resetClassState(PKIFactory.class, "instance_", null);
// reset IAIK MOA configuration
resetClassState(Configurator.class, "C", false);
-
+
//reset ESI-SVA configuration
resetClassState(ConfigurationAdapter.class, "a", null);
- resetClassState(ConfigurationAdapter.class, "instance", null);
+ // resetClassState(ConfigurationAdapter.class, "instance", null);
//resetClassState(ConfigurationAdapter.class, "config", null);
//resetClassState(ConfigurationAdapter.class, "libraryConfig", null);
-
+
}
private static void resetClassState(Class clazz, String fieldName, Object value) {
@@ -101,16 +100,16 @@ public abstract class AbstractIntegrationTest {
Field field7 = clazz.getDeclaredField(fieldName);
if (field7 != null) {
field7.setAccessible(true);
- field7.set(null, value);
+ field7.set(null, value);
}
-
+
} catch (NoSuchFieldException | SecurityException | IllegalArgumentException | IllegalAccessException e) {
e.printStackTrace();
}
-
+
}
-
-
+
+
protected VerifyXMLSignatureRequest buildVerifyXmlRequest(final byte[] signature,
final String trustProfileID, boolean extValFlag,
final List verifyTransformsInfoProfileID, final String xpathSignatureLocation,
diff --git a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/PadesIntegrationTest.java b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/PadesIntegrationTest.java
index 0c7bb63..16037d6 100644
--- a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/PadesIntegrationTest.java
+++ b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/PadesIntegrationTest.java
@@ -32,19 +32,33 @@ import at.gv.egovernment.moa.spss.server.iaik.pki.PKIProfileImpl;
import at.gv.egovernment.moa.spss.server.init.SystemInitializer;
import at.gv.egovernment.moa.spss.server.invoke.CMSSignatureVerificationInvoker;
import at.gv.egovernment.moa.spss.server.logging.TransactionId;
+import at.gv.egovernment.moa.spss.server.utils.LoggerUtils;
import at.gv.egovernment.moa.spss.test.integration.utils.CertificateReader;
+import iaik.pki.KeyUsageParam;
+import iaik.pki.KeyUsageParams;
import iaik.pki.PKIFactory;
import iaik.pki.PKIModule;
import iaik.x509.X509Certificate;
+import iaik.x509.extensions.KeyUsage;
@RunWith(BlockJUnit4ClassRunner.class)
public class PadesIntegrationTest extends AbstractIntegrationTest {
+ public static boolean[] KEY_USAGE;
+
+ static {
+ KeyUsage usage = new KeyUsage(KeyUsage.digitalSignature | KeyUsage.nonRepudiation);
+ KEY_USAGE = usage.getBooleanArray();
+ }
+
CMSSignatureVerificationInvoker cadesInvoker;
@BeforeClass
public static void classInitializer() throws IOException, ConfigurationException,
NoSuchFieldException, SecurityException, IllegalArgumentException, IllegalAccessException {
+
+ LoggerUtils.fixLoggerFactory();
+
jvmStateReset();
final String current = new java.io.File(".").getCanonicalPath();
@@ -252,7 +266,6 @@ public class PadesIntegrationTest extends AbstractIntegrationTest {
}
- @Ignore
@Test
public void pkixTest() throws Exception {
final String current = new java.io.File(".").getCanonicalPath();
@@ -261,14 +274,16 @@ public class PadesIntegrationTest extends AbstractIntegrationTest {
PKIModule pkiModule = PKIFactory.getInstance().getPKIModule(
new PKIProfileImpl(ConfigurationProvider.getInstance(), "MOAIDBuergerkarteAuthentisierungsDaten"));
- //KeyUsageParams keyUsage = new KeyUsageParams();
- //keyUsage.addParam(new KeyUsageParam((boolean[]) null, KeyUsageParam.STRICT));
+ KeyUsageParams keyUsage = new KeyUsageParams();
+ keyUsage.addParam(new KeyUsageParam(KEY_USAGE, KeyUsageParam.STRICT));
pkiModule.validateCertificate(
new Date(),
chain[0],
ArrayUtils.subarray(chain, 1, chain.length),
- (boolean[]) null,
+ //(boolean[]) null,
+ // keyUsage,
+ null,
new TransactionId("aabbccdd"));
System.out.print("Finished");
diff --git a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/XadesIntegrationTest.java b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/XadesIntegrationTest.java
index ebbc334..3f413c3 100644
--- a/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/XadesIntegrationTest.java
+++ b/moaSig/moa-sig/src/test/java/at/gv/egovernment/moa/spss/test/integration/XadesIntegrationTest.java
@@ -37,6 +37,7 @@ import at.gv.egovernment.moa.spss.server.config.ConfigurationException;
import at.gv.egovernment.moa.spss.server.init.SystemInitializer;
import at.gv.egovernment.moa.spss.server.invoke.XMLSignatureCreationInvoker;
import at.gv.egovernment.moa.spss.server.invoke.XMLSignatureVerificationInvoker;
+import at.gv.egovernment.moa.spss.server.utils.LoggerUtils;
import at.gv.egovernment.moaspss.util.DOMUtils;
@RunWith(BlockJUnit4ClassRunner.class)
@@ -46,10 +47,13 @@ public class XadesIntegrationTest extends AbstractIntegrationTest {
XMLSignatureCreationInvoker xadesSignInvoker;
@BeforeClass
- public static void classInitializer() throws IOException, ConfigurationException,
+ public static void classInitializer() throws IOException, ConfigurationException,
NoSuchFieldException, SecurityException, IllegalArgumentException, IllegalAccessException {
+
+ LoggerUtils.fixLoggerFactory();
+
jvmStateReset();
-
+
final String current = new java.io.File(".").getCanonicalPath();
System.setProperty("moa.spss.server.configuration",
current + "/src/test/resources/moaspss_config/MOASPSSConfiguration.xml");
@@ -166,27 +170,27 @@ public class XadesIntegrationTest extends AbstractIntegrationTest {
assertEquals("used sig alg", "SHA256withRSA", result.getSignatureAlgorithm());
}
-
+
@Test
public void simpleXmlSignature() throws MOAException, ParserConfigurationException, SAXException, IOException, TransformerException {
// build request
Element xml = DOMUtils.parseXmlNonValidating(
CadesIntegrationTest.class.getResourceAsStream("/testdata/xades/sign/createXades_1.xml"));
CreateXMLSignatureRequest xmlReq = new CreateXMLSignatureRequestParser().parse(xml);
-
+
// create signature
CreateXMLSignatureResponse xmlResp = xadesSignInvoker.createXMLSignature(xmlReq, Collections.EMPTY_SET);
-
-
+
+
// verify response
assertNotNull("xadesResp", xmlResp);
assertNotNull("xadesResp elements", xmlResp.getResponseElements());
assertFalse("xadesResp elements", xmlResp.getResponseElements().isEmpty());
-
- SignatureEnvironmentResponse signedXml = (SignatureEnvironmentResponse) xmlResp.getResponseElements().get(0);
+
+ SignatureEnvironmentResponse signedXml = (SignatureEnvironmentResponse) xmlResp.getResponseElements().get(0);
assertNotNull("signed xml", signedXml.getSignatureEnvironment());
-
-
+
+
// verify signature
final VerifyXMLSignatureRequest request = buildVerifyXmlRequest(
DOMUtils.serializeNode(signedXml.getSignatureEnvironment()).getBytes(),
@@ -199,7 +203,7 @@ public class XadesIntegrationTest extends AbstractIntegrationTest {
assertNotNull("verification result", result);
assertEquals("sigCode", 0, result.getSignatureCheck().getCode());
assertEquals("certCode", 0, result.getCertificateCheck().getCode());
-
+
}
@Test
@@ -208,20 +212,20 @@ public class XadesIntegrationTest extends AbstractIntegrationTest {
Element xml = DOMUtils.parseXmlNonValidating(
CadesIntegrationTest.class.getResourceAsStream("/testdata/xades/sign/createXades_2.xml"));
CreateXMLSignatureRequest xmlReq = new CreateXMLSignatureRequestParser().parse(xml);
-
+
// create signature
CreateXMLSignatureResponse xmlResp = xadesSignInvoker.createXMLSignature(xmlReq, Collections.EMPTY_SET);
-
-
+
+
// verify response
assertNotNull("xadesResp", xmlResp);
assertNotNull("xadesResp elements", xmlResp.getResponseElements());
assertFalse("xadesResp elements", xmlResp.getResponseElements().isEmpty());
-
- SignatureEnvironmentResponse signedXml = (SignatureEnvironmentResponse) xmlResp.getResponseElements().get(0);
+
+ SignatureEnvironmentResponse signedXml = (SignatureEnvironmentResponse) xmlResp.getResponseElements().get(0);
assertNotNull("signed xml", signedXml.getSignatureEnvironment());
-
-
+
+
// verify signature
final VerifyXMLSignatureRequest request = buildVerifyXmlRequest(
DOMUtils.serializeNode(signedXml.getSignatureEnvironment()).getBytes(),
@@ -234,7 +238,7 @@ public class XadesIntegrationTest extends AbstractIntegrationTest {
assertNotNull("verification result", result);
assertEquals("sigCode", 0, result.getSignatureCheck().getCode());
assertEquals("certCode", 0, result.getCertificateCheck().getCode());
-
+
}
-
+
}
--
cgit v1.2.3