使用WS-Security框架对信息进行加密与身份认证

使用WS-Security框架对信息进行加密与身份认证
[1]
处理流程如下:
1、 客户端(WSGetJlogin)发出调用Web服务请求;
2、 客户端Handler(WSClientRequestHandler)截获请求的SOAP消息;
3、 此Handler对截获的SOAP消息进行数字签名(使用client.keystore中的私钥进行数字签名);
    PrivateKey key = (PrivateKey)keyStore.getKey(alias, keypass.toCharArray());
    调用wSSecurity.sign(doc,    sk, ki);//签名。
4、 此Handler对签名后的SOAP消息进行加密(使用client.truststore中的公钥进行RSA算法加密);
    PublicKey pubk = cert.getPublicKey();
    wSSecurity.encrypt(...)
5、 被加密的SOAP消息通过互联网传送到目标Web服务端口;
6、 服务器端Handler(WSServerRequestHandler)截获从客户端发过来的加密后的SOAP消息;
7、 此Handler对加密的SOAP消息进行解密(使用server.keystore中的私钥进行解密);
    PrivateKey prvk2 = (PrivateKey)keyStore.getKey(alias, keypass.toCharArray());
    wSSecurity.decrypt(doc, prvk2, null);
8、 此Handler对SOAP消息进行身份验证(使用server.truststore包含了所信任的身份信息进行身份验证),如果验证不通过,将抛出异常;
    用verifier对象TrustVerifier verifier = new X509TrustVerifier(keyStore);
    调用wSSecurity.verify(doc, verifier, null,null);
9、 此Handler删除被解密后的SOAP消息中与WS-Security相关的元素;
10、 解密后正确的原始SOAP消息被发送到目标Web服务端(如WSjLogin);
11、 目标Web服务对Web服务请求进行处理,然后返回响应的SOAP消息;
12、 服务器端Handler(WSServerResponseHandler)截获响应的SOAP消息;
13、 此Handler对截获的SOAP消息进行数字签名(使用server.keystore作为签名依据);
14、 此Handler对签名后的SOAP消息进行加密(使用server.truststore的公钥进行RSA算法加密);
15、 被加密的SOAP消息通过互联网传送到目客户端;
16、 客户端Handler(WSClientResponseHandler)截获加密的SOAP消息;
17、 此Handler对加密的SOAP消息进行解密(使用clilent.truststore中的私钥);
18、 此Handler对SOAP消息进行身份验证(client.truststore包含了所信任的身份信息),如果验证不
通过,将抛出异常;
19、 此Handler删除被解密后的SOAP消息中与WS-Security相关的元素;
20、 被解密后的SOAP消息发送到目标客户端,客户端输出调用结果。
从上面可以看出,在一个SOAP调用回合中,要对SOAP消息进行四次处理。基本上都是"签名-'加密'-解密'-验证"的过程。
从而确保了数据来源的正确性(只有拥有私钥/公钥的人,才能打开用公钥/私钥加密的文件,从而确保来源的正确性.),以及数据传输的秘密性(加密传递).
3.说明:
进行签名/加密/解密/身份验证:
1)
都要先加载keyStore实例,再进行签名/加密/解密/身份验证:
FileInputStream fileInputStream = new FileInputStream(keystore);
java.security.KeyStore keyStore = java.security.KeyStore.getInstance(storetype);
keyStore.load(fileInputStream, storepass.toCharArray());
2)
在服务端,客户端在进行'签名,加密,解密,身份验证'时,都是:
1.先根据public void invoke(MessageContext messageContext) throws AxisFault {..
获取soapmessage,且转换成doc
SOAPMessage soapMessage =    messageContext.getCurrentMessage();
Document doc = MessageConverter.convertSoapMessageToDocument(soapMessage);
2.签名,加密/解密,身份验证
3.doc-->soapmessage:
soapMessage = MessageConverter.convertDocumentToSOAPMessage(doc);
messageContext.setMessage(soapMessage);
3)
公钥-私钥加密,即是非对称加密.公钥是给大家用于加密的.私钥,是给自己的,要小心保存,用于解密的.确保接受者的身份是正确的.同时,也是数据的正确性(加密传递,别人无法修改)

[2]
详细过程:
(1)
使用ISNetworks安全提供者,ISNetworks实现了RSA加密、解密算法。
当然,你也可以使用其它的安全提供者,并且可以使用不同的加密算法。
ISNetworks相关包ISNetworksProvider.jar。拷贝到:项目根目录/WEB-INF/lib
(2)
Trust Services Integration Kit提供了一个WS-Security实现。
须用到的jar包是ws-security.jar和tsik.jar。
ws-security.jar中包含一个WSSecurity类,我们使用它来对XML进行数字签名和验证,加密与解密。同样
拷贝到:项目根目录/WEB-INF/lib
(3)
创建相关密匙库和信任库(gen-cer-store.bat)。
将以下内容放于bat中,点击即可产生所有的库.如下:
set SERVER_DN="CN=JasonServer, OU=jasonS, O=jasonS, L=shenzhen, S=guangdong, C=CN"
set CLIENT_DN="CN=JasonClient, OU=jasonC, O=jasonC, L=shenzhen, S=guangdong, C=CN"
set KS_PASS=-storepass access
set KEYINFO=-keyalg RSA
echo 生成server.keystore。
keytool -genkey -dname %SERVER_DN% -alias jserver  %KS_PASS%  %KEYINFO% -keystore
server.keystore -keypass access -keysize 1024 -validity 3650
echo 从server.keystore导出数字证书。
keytool -export -file jason_axis.cer -alias jserver -keystore server.keystore %KS_PASS%
echo 将服务器的数字证书导入到客户端信任的truststore中
keytool -import -file jason_axis.cer -alias serverkey -keystore client.truststore %KS_PASS% 
-noprompt
echo 生成client.keystore。
keytool -genkey -dname %CLIENT_DN% -alias jclient  %KS_PASS%  %KEYINFO% -keystore
client.keystore -keypass access -keysize 1024 -validity 3650
echo 从client.keystore导出数字证书。
keytool -export -file jason_axis.cer -alias jclient -keystore client.keystore %KS_PASS%
echo 将客户端的数字证书导出到服务器信任的truststore中。
keytool -import -file jason_axis.cer -alias clientkey -keystore server.truststore %KS_PASS% 
-noprompt
成功创建后,会有产生以下四个文件,其中:
    * client.keystore:客户端自身的身份信息;
    * client.truststore:客户端所信任的身份信息,在此例中也就是包含了服务器的身份信息;
    * server.keystore:服务器自身的身份信息;
    * server.truststore:服务器所信任的身份信息(即客户端身份信息)。
(4)
框架结构
    WSHelper.java //核心类,对SOAP消息签名、加密、解密、身份验证
    MessageConverter.java  //帮助类,Document、SOAP消息互相转换
    WSClientHandler.java  //基类,包含了一些公用方法
    WSClientRequestHandler.java //继承于WSClientHandler.java,调用WSHelper.java对客户端发出
的XML文档进行加密
    WSClientResponseHandler.java //继承于WSClientHandler.java,调用WSHelper.java对服务器端返
回的XML文档进行解密
    WSServerHandler.java //基类,包含了一些公用方法(初始化,从配置文件server-config.wsdd中读
取属性)
    WSServerRequestHandler.java //继承于WSServerHandler.java,调用WSHelper.java对客户端发出
的加密后的XML文档进行解密
    WSServerResponseHandler.java//继承于WSServerHandler.java,调用WSHelper.java对服务器端返
回的XML文档进行加密
具体代码如下:
package com.laoer.bbscs.webservice;

public class WSHelper {
   static String PROVIDER= "ISNetworks" ; //JSSE安全提供者。
//  添加JSSE安全提供者,你也可以使用其它安全提供者。只要支持DESede算法。这是程序里动态加载还可以在JDK中静态加载
   static
  {
    java.security.Security.addProvider( new com.isnetworks.provider.jce.ISNetworksProvider());
  }
   /**
    *对XML文档进行数字签名。
    */

   public static void sign(Document doc, String keystore, String storetype,
      String storepass, String alias, String keypass) throws Exception {
    FileInputStream fileInputStream = new FileInputStream(keystore);
    java.security.KeyStore keyStore = java.security.KeyStore.getInstance(storetype);
    keyStore.load(fileInputStream, storepass.toCharArray());
    PrivateKey key = (PrivateKey)keyStore.getKey(alias, keypass.toCharArray());
     //从密钥库中直接读取证书,实例化 X.509 证书
    X509Certificate cert = (X509Certificate)keyStore.getCertificate(alias);
    SigningKey sk = SigningKeyFactory.makeSigningKey(key);
    KeyInfo ki = new KeyInfo();
    ki.setCertificate(cert);
    WSSecurity wSSecurity = new WSSecurity(); //ws-security.jar中包含的WSSecurity类
    wSSecurity.sign(doc,    sk, ki); //签名。


  }
   /**
    *对XML文档进行身份验证。
    */

   /*
  对SOAP消息进行验证就是使用keystore的信息生成TrustVerifier对象,然后调用WSSecurity的verify方
  法进行验证。
  */

   public static boolean verify(Document doc, String keystore, String storetype,
      String storepass) throws Exception {
    FileInputStream fileInputStream = new FileInputStream(keystore);
    java.security.KeyStore keyStore = java.security.KeyStore.getInstance(storetype);
    keyStore.load(fileInputStream, storepass.toCharArray());
    TrustVerifier verifier = new X509TrustVerifier(keyStore);
    WSSecurity wSSecurity = new WSSecurity();
    MessageValidity[] resa = wSSecurity.verify(doc, verifier, null , null );
     if (resa.length > 0)
       return resa[0].isValid();
     return false ;
  }
   /**
    *对XML文档进行加密。必须有JSSE提供者才能加密。
    */

   public static void encrypt(Document doc, String keystore, String storetype,
      String storepass, String alias) throws Exception {
     try
    {
      FileInputStream fileInputStream = new FileInputStream(keystore);
      java.security.KeyStore keyStore = java.security.KeyStore.getInstance(storetype);
      keyStore.load(fileInputStream, storepass.toCharArray());
      X509Certificate cert = (X509Certificate)keyStore.getCertificate(alias);
      PublicKey pubk = cert.getPublicKey();
      KeyGenerator keyGenerator = KeyGenerator.getInstance( "DESede" ,PROVIDER);
      keyGenerator.init(168, new SecureRandom());
      SecretKey key = keyGenerator.generateKey();
      KeyInfo ki = new KeyInfo();
      ki.setCertificate(cert);
      WSSecurity wSSecurity = new WSSecurity();
       //加密。
      wSSecurity.encrypt(doc, key, AlgorithmType.TRIPLEDES, pubk, AlgorithmType.RSA1_5, ki);
    }
     catch (Exception e)
    {
      e.printStackTrace();
    }
  }
   /**
    *对文档进行解密。
    */

   public static void decrypt(Document doc, String keystore, String storetype,
      String storepass, String alias, String keypass) throws Exception {
    FileInputStream fileInputStream = new FileInputStream(keystore);
    java.security.KeyStore keyStore = java.security.KeyStore.getInstance(storetype);
    keyStore.load(fileInputStream, storepass.toCharArray());
    System.out.println("");
    System.out.println( "----------------keystore:" +keystore);
    System.out.println( "----------------storetype:" +storetype);
    System.out.println( "----------------keyStore:" +keyStore);
    System.out.println( "----------------alias:" +alias);
    System.out.println( "----------------keypass.toCharArray():" +keypass.toCharArray());
    PrivateKey prvk2 = (PrivateKey)keyStore.getKey(alias, keypass.toCharArray());

    WSSecurity wSSecurity = new WSSecurity();
     //解密。

    wSSecurity.decrypt(doc, prvk2, null );
    WsUtils.removeEncryptedKey(doc); //从 WS-Security    Header中删除 EncryptedKey 元素
  }

   public static void removeWSSElements(Document doc) throws Exception {
    WsUtils.removeWSSElements(doc); // 删除WSS相关的元素。
  }

}
class WsUtils
{

   private static final String WSSE_URI =
     "http://schemas.xmlsoap.org/ws/2002/07/secext";
  private static final String WSSE_PREFIX = "wsse" ;
  private static final String WSU_URI =
    "http://schemas.xmlsoap.org/ws/2002/07/utility";
  private static final String WSU_PREFIX = "wsu" ;
  private static final String SOAP_URI = Namespaces.SOAPENV.getUri();
  private static final String SOAP_PREFIX = Namespaces.SOAPENV.getPrefix();
  private static final String XMLSIG_URI = Namespaces.XMLSIG.getUri();
  private static final String XMLSIG_PREFIX = Namespaces.XMLSIG.getPrefix();
  private static final String XMLENC_URI = Namespaces.XMLENC.getUri();
  private static final String XMLENC_PREFIX = Namespaces.XMLENC.getPrefix();
  private static final String SOAP_ENVELOPE = "Envelope" ;
  private static final String SOAP_HEADER = "Header" ;
  private static final String SOAP_BODY = "Body" ;
  private static final String SOAP_FAULT = "Fault" ;
  private static final boolean USE_WSU_FOR_SECURITY_TOKEN_ID = false ;    

  public static void removeEncryptedKey(Document message) throws XmlMessageException {

    DOMWriteCursor domCursor = new DOMWriteCursor(message);
    validate(domCursor);

    // 从 WS-Security Header中删除 EncryptedKey 元素
    if (domCursor.moveToChild(SOAP_URI, SOAP_HEADER)) {
      if (domCursor.moveToChild(WSSE_URI, "Security" )) {
        if (domCursor.moveToChild(XMLENC_URI, "EncryptedKey" )) {
          domCursor.remove();
        }
      }
    }
  }
  //删除WSS相关的元素。
  public static void removeWSSElements(Document message) throws XmlMessageException {
    DOMWriteCursor domWriteCursor = new DOMWriteCursor(message);

    validate(domWriteCursor);

    // 删除 WS-Security Header元素
    if (domWriteCursor.moveToChild(SOAP_URI, SOAP_HEADER)) {
      if (domWriteCursor.moveToChild(WSSE_URI, "Security" )) {
        domWriteCursor.remove();
      }
    }

    // 删除 Timestamp Header 元素
    domWriteCursor.moveToTop();
    if (domWriteCursor.moveToChild(SOAP_URI, SOAP_HEADER)) {
      if (domWriteCursor.moveToChild(WSU_URI, "Timestamp" )) {
        domWriteCursor.remove();
      }
    }

    // 从body中删除 wsu:Id 属性
    domWriteCursor.moveToTop();
    if (domWriteCursor.moveToChild(SOAP_URI, SOAP_BODY)) {
      domWriteCursor.setAttribute(WSU_URI, WSU_PREFIX, "Id" , null );
    }    

  }
  //检查是否有效
  private static void validate(DOMCursor domCursor) throws XmlMessageException {
    domCursor.moveToTop();
    if (!domCursor.atElement(SOAP_URI, SOAP_ENVELOPE)) {
      throw new XmlMessageException("soap消息丢失或者不正确!" );
    }
  }
}
 
/**
*把Document与SOAPMessage进行相互转换
*/

public class MessageConverter
{
   /**
    *把Document转换成SOAPMessage
    */

   public static SOAPMessage convertDocumentToSOAPMessage(Document doc) throws
  TransformerConfigurationException, TransformerException,    SOAPException, IOException
  {
    TransformerFactory transformerFactory = TransformerFactory.newInstance();
    Transformer transformer = transformerFactory.newTransformer();

    ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();
    transformer.transform( new DOMSource(doc), new StreamResult(byteArrayOutputStream));
    MessageFactory messageFactory = MessageFactory.newInstance();
    MimeHeaders header= new MimeHeaders();
    header.addHeader( "Content-Type" , "text/xml" );
    SOAPMessage soapMsg = messageFactory.createMessage(header, new ByteArrayInputStream(byteArrayOutputStream.toByteArray(),0,byteArrayOutputStream.size()));

     return soapMsg;
  }
   /**
    *把SOAPMessage转换成Document
    */

   public static Document convertSoapMessageToDocument(SOAPMessage soapMsg) throws
  ParserConfigurationException, SAXException, SOAPException, IOException
  {
    ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();
    soapMsg.writeTo(byteArrayOutputStream);
    ByteArrayInputStream bais = new ByteArrayInputStream(byteArrayOutputStream.toByteArray(),0,byteArrayOutputStream.size());

    DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();
    documentBuilderFactory.setNamespaceAware( true );
    DocumentBuilder documentBuilder = documentBuilderFactory.newDocumentBuilder();
    Document doc = documentBuilder.parse(bais);
     return doc;
  }
}
 
package com.ws;

public class WSClientHandler extends BasicHandler{
   protected String keyStoreFile ;
   protected     String keyStoreType = "JKS" ; //默认
   protected String keyStorePassword ;
   protected String keyAlias ;
   protected String keyEntryPassword ;
   protected String trustStoreFile ;
   protected String trustStoreType = "JKS" ; //默认
   protected String trustStorePassword ;
   protected String certAlias ;

   public void setInitialization(String keyStoreFile,String keyStoreType,String keyStorePassword,
      String keyAlias,String keyEntryPassword,String trustStoreFile,
      String trustStoreType,String trustStorePassword,String certAlias){
     this .keyStoreFile=keyStoreFile;
     this .keyStoreType=keyStoreType;
     this .keyStorePassword=keyStorePassword;
     this .keyAlias=keyAlias;
     this .keyEntryPassword=keyEntryPassword;
     this .trustStoreFile=trustStoreFile;
     this .trustStoreType=trustStoreType;
     this .trustStorePassword=trustStorePassword;
     this .certAlias=certAlias;
  }
   public void setInitialization(String keyStoreFile,String keyStorePassword,
      String keyAlias,String keyEntryPassword,String trustStoreFile,
      String trustStorePassword,String certAlias){
     this .keyStoreFile=keyStoreFile;
     this .keyStorePassword=keyStorePassword;
     this .keyAlias=keyAlias;
     this .keyEntryPassword=keyEntryPassword;
     this .trustStoreFile=trustStoreFile;
     this .trustStorePassword=trustStorePassword;
     this .certAlias=certAlias;
  }
   public void invoke(MessageContext messageContext) throws AxisFault { //在这个方法里对XML文档进行处理
     //do nothing now!
  }
   public void onFault(MessageContext msgContext) {
    System.out.println( "处理错误,这里忽略!" );
  }
}
 
package com.ws;

public class WSClientRequestHandler extends WSClientHandler{
   public void invoke(MessageContext messageContext) throws AxisFault {
     try {
      System.out.println( "-------------------------WSClientRequestHandler开始工作------------------" );
      SOAPMessage soapMessage = messageContext.getMessage();
      Document doc = MessageConverter.convertSoapMessageToDocument (soapMessage); //soapMessage转换为Document
      WSHelper.sign(doc, keyStoreFile, keyStoreType,keyStorePassword,    keyAlias, keyEntryPassword); //数字签名
      WSHelper.encrypt(doc, trustStoreFile, trustStoreType,    trustStorePassword, certAlias); //加密
      soapMessage = MessageConverter.convertDocumentToSOAPMessage(doc);    
//      处理后的Document再转换回soapMessage
      messageContext.setMessage(soapMessage);
    } catch (Exception e){
      System.err.println( "在处理响应时发生以下错误�? " + e);
      e.printStackTrace();    }
  }
}    
 
package com.ws;

public class WSClientResponseHandler extends WSClientHandler{
   public void invoke(MessageContext messageContext) throws AxisFault {
     try {
      System.out.println( "-------------------------WSClientResponseHandler开始工作------------------" );
      SOAPMessage soapMessage =    messageContext.getCurrentMessage();
      Document doc = MessageConverter.convertSoapMessageToDocument(soapMessage);

      WSHelper.decrypt(doc, keyStoreFile, keyStoreType,
          keyStorePassword, keyAlias, keyEntryPassword); //解密

          WSHelper.verify (doc, trustStoreFile, trustStoreType, trustStorePassword); //验证
          WSHelper.removeWSSElements(doc);
          soapMessage = MessageConverter.convertDocumentToSOAPMessage(doc);
          messageContext.setMessage(soapMessage);
    } catch (Exception e){
      e.printStackTrace();
      System.err.println( "在处理响应时发生以下错误�? " + e);
    }

  }
}        
 
package com.laoer.bbscs.webservice;

public class WSServerHandler extends BasicHandler{
   protected String keyStoreFile ;
   protected     String keyStoreType = "JKS" ; //默认
   protected String keyStorePassword ;
   protected String keyAlias ;
   protected String keyEntryPassword ;
   protected String trustStoreFile ;
   protected String trustStoreType = "JKS" ; //默认
   protected String trustStorePassword ;
   protected String certAlias ;

   public void invoke(MessageContext messageContext) throws AxisFault {
     //do nothing now!
  }
   public void onFault(MessageContext msgContext) {
    System.out.println( "处理错误,这里忽略!" );
  }
   public void init() { //初始化,从配置文件server-config.wsdd中读取属性
    keyStoreFile = (String)getOption( "keyStoreFile" );
     if (( keyStoreFile== null ) )
      System.err.println( "Please keyStoreFile configured for the Handler!" );
    trustStoreFile = (String)getOption( "trustStoreFile" );
     if ((    trustStoreFile== null ) )
      System.err.println( "Please trustStoreFile configured for the Handler!" );
    keyStorePassword = (String)getOption( "keyStorePassword" );
     if (( keyStorePassword== null ) )
      System.err.println( "Please keyStorePassword configured for the Handler!" );
    keyAlias = (String)getOption( "keyAlias" );
     if (( keyAlias== null ) )
      System.err.println( "Please keyAlias configured for the Handler!" );
    keyEntryPassword = (String)getOption( "keyEntryPassword" );
     if (( keyEntryPassword== null ) )
      System.err.println( "Please keyEntryPassword configured for the Handler!" );
    trustStorePassword = (String)getOption( "trustStorePassword" );
     if (( trustStorePassword== null ) )
      System.err.println( "Please trustStorePassword configured for the Handler!" );
    certAlias = (String)getOption( "certAlias" );
     if ((certAlias== null ))
      System.err.println( "Please certAlias configured for the Handler!" );
     if ((getOption( "keyStoreType" )) != null )
      keyStoreType = (String)getOption( "keyStoreType" );
     if ((getOption( "trustStoreType" )) != null )
      trustStoreType = (String)getOption( "trustStoreType" );
  }
}        
 
package com.laoer.bbscs.webservice;

public class WSServerRequestHandler extends WSServerHandler{
   public void invoke(MessageContext messageContext) throws AxisFault {
     try {
      System.out.println( "-------------------------WSServerRequestHandler开始工作------------------" );
      SOAPMessage msg = messageContext.getCurrentMessage();
      Document doc = MessageConverter.convertSoapMessageToDocument(msg);
      System.out.println( "接收的原始消息:" );
      msg.writeTo(System.out);
      WSHelper.decrypt(doc, keyStoreFile, keyStoreType,
          keyStorePassword, keyAlias, keyEntryPassword); //解密

          WSHelper.verify (doc, trustStoreFile, trustStoreType, trustStorePassword); //验证
          WSHelper.removeWSSElements(doc);
          msg = MessageConverter.convertDocumentToSOAPMessage(doc);
          System.out.println( "怀原后的原始消息:" );
          msg.writeTo(System.out);
          messageContext.setMessage(msg);
    } catch (Exception e){
      e.printStackTrace();
      System.err.println( "在处理响应时发生以下错误: " + e);
    }

  }
}
 
package com.laoer.bbscs.webservice;

public class WSServerResponseHandler extends WSServerHandler{
   public void invoke(MessageContext messageContext) throws AxisFault {
     try {
System.out.println( "-------------------------WSServerResponseHandler开始工作------------------" );
      SOAPMessage soapMessage = messageContext.getMessage();
      System.out.println( "返回的原始消息:" );
      soapMessage.writeTo(System.out);
      Document doc = MessageConverter.convertSoapMessageToDocument(soapMessage);

      WSHelper.sign(doc, keyStoreFile, keyStoreType,
          keyStorePassword, keyAlias, keyEntryPassword); //数字签名
      WSHelper.encrypt(doc, trustStoreFile, trustStoreType, //加密
          trustStorePassword, certAlias);

      soapMessage = MessageConverter.convertDocumentToSOAPMessage(doc);
      System.out.println( "返回的加密后的消息:" );
      soapMessage.writeTo(System.out);
      messageContext.setMessage(soapMessage);
    } catch (Exception e){
      System.err.println( "在处理响应时发生以下错误: " + e);
      e.printStackTrace();
    }

  }
}
 
<!-- WS-Security -->    
  <service name= "WSjLogin" provider= "java:RPC" >
    <requestFlow> 
            
      <handler type= "java:com.laoer.bbscs.webservice.WSServerRequestHandler" >
                            <parameter name= "keyStoreFile" value= "D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/server.keystore" />
                            <parameter name= "trustStoreFile" value= "D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/server.truststore" />
                            <parameter name= "keyStorePassword" value= "access" />
                            <parameter name= "keyAlias" value= "jserver" />
                            <parameter name= "keyEntryPassword" value= "access" />
                            <parameter name= "trustStorePassword" value= "access" />
                            <parameter name= "certAlias" value= "clientkey" />
                     </handler>
    </requestFlow>
    
    <responseFlow>
                     <handler type= "java:com.laoer.bbscs.webservice.WSServerResponseHandler" >
                            <parameter name= "keyStoreFile" value= "D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/server.keystore" />
                            <parameter name= "trustStoreFile"     value= "D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/server.truststore" />
                            <parameter name= "keyStorePassword" value= "access" />
                            <parameter name= "keyAlias" value= "jserver" />
                            <parameter name= "keyEntryPassword" value= "access" />
                            <parameter name= "trustStorePassword" value= "access" />
                            <parameter name= "certAlias" value= "clientkey" />
                     </handler>
                </responseFlow>
                
    <parameter name= "allowedMethods" value= "*" />
    <parameter name= "className" value= "com.laoer.bbscs.webservice.WSjLogin" /> 
     
  </service>
 
package com.laoer.bbscs.webservice;
public class WSjLogin extends ServletEndpointSupport{
    
   private JLogin jlogin;
   protected void onInit() throws ServiceException {    
//    在Spring容器中获取Bean的实例    
    jlogin = (JLogin) getApplicationContext().getBean( "JLogin" );    
  }    

   public String getMessage(String name) throws RemoteException {    
     return "登录者" +name+ "的密码是:" +jlogin.ForWS(name);    
  }    
}
 
package com.ws;
public class WSGetJlogin {

   public static void main(String[] args)    
  {
    String endpoint= "http://127.0.0.1:8080/BBSCS_8_0_3/services/WSjLogin";
    try {
      Service service=new Service();
        
      String keyStorePath="D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/client.keystore" ;
      String trustStorePath="D:/tomcat_bbs/webapps/BBSCS_8_0_3/WEB-INF/wsKeyStores/client.truststore" ;
注意新加的HANDLER
      WSClientHandler handler=new WSClientRequestHandler();
                        handler.setInitialization(keyStorePath,"access" ,"jclient" ,"access" ,trustStorePath,"access" ,"serverkey" );//初始化 
                        WSClientHandler handlee=new WSClientResponseHandler();
                        handlee.setInitialization(keyStorePath,"access" ,"jclient" ,"access" ,trustStorePath,"access" ,"serverkey" );//初始化 
        
      Call call=(Call)service.createCall();
        
      call.setClientHandlers(handler, handlee);//���Handler
        
      call.setTargetEndpointAddress(endpoint);
      call.setOperationName("getMessage" );
      call.getMessageContext().setUsername("jason" );
      call.getMessageContext().setPassword("1234" );
      String bbscsPassword=(String)call.invoke(new Object[]{"shenzhenchufa" });
      System.out.println(bbscsPassword);
    } catch (Exception e) {
      e.printStackTrace();
    }
  }
}
  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值