You can subscribe to this list here.
| 2003 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(119) |
Oct
(111) |
Nov
(238) |
Dec
(395) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
(239) |
Feb
(59) |
Mar
(354) |
Apr
(489) |
May
(23) |
Jun
(2) |
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
| 2006 |
Jan
|
Feb
|
Mar
|
Apr
(4) |
May
(5) |
Jun
(2) |
Jul
|
Aug
|
Sep
(3) |
Oct
(14) |
Nov
(17) |
Dec
(9) |
| 2007 |
Jan
(4) |
Feb
(3) |
Mar
|
Apr
(1) |
May
(1) |
Jun
(2) |
Jul
|
Aug
|
Sep
(1) |
Oct
(2) |
Nov
(1) |
Dec
|
| 2008 |
Jan
|
Feb
|
Mar
(1) |
Apr
(7) |
May
(3) |
Jun
(6) |
Jul
(4) |
Aug
(3) |
Sep
(15) |
Oct
(13) |
Nov
(35) |
Dec
(40) |
| 2009 |
Jan
(19) |
Feb
(21) |
Mar
(16) |
Apr
(18) |
May
(36) |
Jun
(20) |
Jul
(32) |
Aug
(11) |
Sep
(3) |
Oct
(2) |
Nov
(2) |
Dec
(13) |
| 2010 |
Jan
(5) |
Feb
(5) |
Mar
(7) |
Apr
(1) |
May
(1) |
Jun
(3) |
Jul
(1) |
Aug
(1) |
Sep
(1) |
Oct
(1) |
Nov
|
Dec
|
| 2011 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
(1) |
Aug
(1) |
Sep
(1) |
Oct
(4) |
Nov
|
Dec
(3) |
| 2012 |
Jan
(3) |
Feb
(3) |
Mar
(1) |
Apr
(4) |
May
(8) |
Jun
(4) |
Jul
(9) |
Aug
(2) |
Sep
(8) |
Oct
(3) |
Nov
(8) |
Dec
(4) |
| 2013 |
Jan
(2) |
Feb
(1) |
Mar
(5) |
Apr
(6) |
May
(10) |
Jun
(5) |
Jul
(6) |
Aug
(7) |
Sep
(5) |
Oct
(2) |
Nov
(4) |
Dec
(4) |
| 2014 |
Jan
(13) |
Feb
(4) |
Mar
(7) |
Apr
(9) |
May
(20) |
Jun
(13) |
Jul
(10) |
Aug
(3) |
Sep
(5) |
Oct
(2) |
Nov
(2) |
Dec
(2) |
| 2015 |
Jan
(3) |
Feb
(3) |
Mar
(5) |
Apr
(4) |
May
(3) |
Jun
(2) |
Jul
(4) |
Aug
(3) |
Sep
(1) |
Oct
|
Nov
(1) |
Dec
(3) |
| 2016 |
Jan
|
Feb
(1) |
Mar
(1) |
Apr
(1) |
May
(1) |
Jun
(2) |
Jul
(1) |
Aug
(4) |
Sep
(3) |
Oct
(3) |
Nov
(4) |
Dec
(2) |
| 2017 |
Jan
|
Feb
(2) |
Mar
|
Apr
(2) |
May
(1) |
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: <pe...@us...> - 2003-11-19 14:37:43
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/applets
In directory sc8-pr-cvs1:/tmp/cvs-serv8349/src/java/org/neuclear/commons/crypto/applets
Added Files:
KeyGenerationTask.java KeyGeneratorApplet.java
Log Message:
CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency.
And the beginnings of a KeyGeneratorApplet
--- NEW FILE: KeyGenerationTask.java ---
package org.neuclear.commons.crypto.applets;
import java.security.KeyPairGenerator;
import java.security.KeyPair;
/**
* (C) 2003 Antilles Software Ventures SA
* User: pelleb
* Date: Nov 19, 2003
* Time: 9:18:12 AM
* $Id: KeyGenerationTask.java,v 1.1 2003/11/19 14:37:37 pelle Exp $
* $Log: KeyGenerationTask.java,v $
* Revision 1.1 2003/11/19 14:37:37 pelle
* CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency.
* And the beginnings of a KeyGeneratorApplet
*
*/
public class KeyGenerationTask implements Runnable{
public KeyGenerationTask(KeyPairGenerator kpg,KeyGeneratorApplet applet) {
this.kpg = kpg;
this.applet=applet;
}
/**
* When an object implementing interface <code>Runnable</code> is used
* to create a thread, starting the thread causes the object's
* <code>run</code> method to be called in that separately executing
* thread.
* <p>
* The general contract of the method <code>run</code> is that it may
* take any action whatsoever.
*
* @see Thread#run()
*/
public void run() {
KeyPair kp=kpg.generateKeyPair();
applet.setKp(kp);
}
private final KeyGeneratorApplet applet;
private final KeyPairGenerator kpg;
}
--- NEW FILE: KeyGeneratorApplet.java ---
package org.neuclear.commons.crypto.applets;
import org.neuclear.commons.crypto.passphraseagents.GuiDialogAgent;
import java.applet.Applet;
import java.util.Random;
import java.security.SecureRandom;
import java.security.NoSuchAlgorithmException;
import java.security.KeyPairGenerator;
import java.security.KeyPair;
import java.awt.*;
import java.awt.event.ActionListener;
import java.awt.event.ActionEvent;
/**
* (C) 2003 Antilles Software Ventures SA
* User: pelleb
* Date: Nov 19, 2003
* Time: 8:57:03 AM
* $Id: KeyGeneratorApplet.java,v 1.1 2003/11/19 14:37:37 pelle Exp $
* $Log: KeyGeneratorApplet.java,v $
* Revision 1.1 2003/11/19 14:37:37 pelle
* CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency.
* And the beginnings of a KeyGeneratorApplet
*
*/
public class KeyGeneratorApplet extends Applet {
/**
* Called by the browser or applet viewer to inform
* this applet that it should start its execution. It is called after
* the <code>init</code> method and each time the applet is revisited
* in a Web page.
* <p>
* A subclass of <code>Applet</code> should override this method if
* it has any operation that it wants to perform each time the Web
* page containing it is visited. For example, an applet with
* animation might want to use the <code>start</code> method to
* resume animation, and the <code>stop</code> method to suspend the
* animation.
* <p>
* The implementation of this method provided by the
* <code>Applet</code> class does nothing.
*
* @see Applet#destroy()
* @see Applet#init()
* @see Applet#stop()
*/
public void start() {
// TODO seed Random NumberGenerator
statusLabel.setText("Click OK to Start Key Generation");
}
/**
* Called by the browser or applet viewer to inform
* this applet that it has been loaded into the system. It is always
* called before the first time that the <code>start</code> method is
* called.
* <p>
* A subclass of <code>Applet</code> should override this method if
* it has initialization to perform. For example, an applet with
* threads would use the <code>init</code> method to create the
* threads and the <code>destroy</code> method to kill them.
* <p>
* The implementation of this method provided by the
* <code>Applet</code> class does nothing.
*
* @see Applet#destroy()
* @see Applet#start()
* @see Applet#stop()
*/
public void init() {
try {
random=SecureRandom.getInstance("SHA1PRNG");
kpg=KeyPairGenerator.getInstance("RSA");
kpg.initialize(1024,random);
} catch (NoSuchAlgorithmException e) {
}
agent=new GuiDialogAgent();
Panel panel = new Panel();
panel.setLayout(new BorderLayout());
add(panel);
Panel text = new Panel(new FlowLayout());
panel.add(text, BorderLayout.NORTH);
keygenTask=new Thread(new KeyGenerationTask(kpg,this));
try {
final Image img = Toolkit.getDefaultToolkit().getImage(this.getClass().getClassLoader().getResource("org/neuclear/commons/crypto/passphraseagents/neuclear.png"));
Canvas canvas = new Canvas() {
public void paint(Graphics g) {
setSize(50, 50);
g.drawImage(img, 0, 0, this);
}
};
canvas.setSize(50, 50);
text.add(canvas);
} catch (Throwable e) {
;
// } catch (InterruptedException e) {
;//System.out.println("Couldn't load Image");
}
statusLabel = new Label();
statusLabel.setForeground(Color.blue);
text.add(statusLabel);
Panel buttons = new Panel(new FlowLayout());
panel.add(buttons, BorderLayout.SOUTH);
ok = new Button("OK");
buttons.add(ok);
Button cancel = new Button("Cancel");
buttons.add(cancel);
cancel.addActionListener(new ActionListener() {
public void actionPerformed(ActionEvent actionEvent) {
if (keygenTask!=null)
keygenTask.interrupt();
ok.setEnabled(true);
}
});
ActionListener action = new ActionListener() {
public void actionPerformed(ActionEvent actionEvent) {
ok.setEnabled(false);
keygenTask.run();
}
};
ok.addActionListener(action);
}
/**
* Called by the browser or applet viewer to inform
* this applet that it is being reclaimed and that it should destroy
* any resources that it has allocated. The <code>stop</code> method
* will always be called before <code>destroy</code>.
* <p>
* A subclass of <code>Applet</code> should override this method if
* it has any operation that it wants to perform before it is
* destroyed. For example, an applet with threads would use the
* <code>init</code> method to create the threads and the
* <code>destroy</code> method to kill them.
* <p>
* The implementation of this method provided by the
* <code>Applet</code> class does nothing.
*
* @see Applet#init()
* @see Applet#start()
* @see Applet#stop()
*/
public void destroy() {
random=null;
}
void setKp(KeyPair kp) {
publickey=kp.getPublic().getEncoded();
privatekey = kp.getPrivate().getEncoded();
}
private SecureRandom random;
private GuiDialogAgent agent;
private KeyPairGenerator kpg;
private KeyPair kp;
private byte[] publickey;
private byte[] privatekey;
private Button ok;
private Label statusLabel;
private Thread keygenTask;
}
|
|
From: <pe...@us...> - 2003-11-19 14:37:43
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/passphraseagents
In directory sc8-pr-cvs1:/tmp/cvs-serv8349/src/java/org/neuclear/commons/crypto/passphraseagents
Modified Files:
CommandLineAgent.java
Log Message:
CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency.
And the beginnings of a KeyGeneratorApplet
Index: CommandLineAgent.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/passphraseagents/CommandLineAgent.java,v
retrieving revision 1.1
retrieving revision 1.2
diff -C2 -d -r1.1 -r1.2
*** CommandLineAgent.java 11 Nov 2003 21:17:46 -0000 1.1
--- CommandLineAgent.java 19 Nov 2003 14:37:37 -0000 1.2
***************
*** 25,28 ****
--- 25,32 ----
$Id$
$Log$
+ Revision 1.2 2003/11/19 14:37:37 pelle
+ CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency.
+ And the beginnings of a KeyGeneratorApplet
+
Revision 1.1 2003/11/11 21:17:46 pelle
Further vital reshuffling.
***************
*** 55,59 ****
try {
//TODO Figure out how to mask input
! return reader.readLine().toCharArray();
} catch (IOException e) {
System.err.println("Couldnt read line. Returning empty passphrase");
--- 59,63 ----
try {
//TODO Figure out how to mask input
! return new jline.ConsoleReader().readLine(new Character((char)0)).toCharArray();
} catch (IOException e) {
System.err.println("Couldnt read line. Returning empty passphrase");
***************
*** 64,69 ****
public static void main(String args[]) {
PassPhraseAgent dia = new CommandLineAgent();
! System.out.println("Getting passphrase... " + dia.getPassPhrase("neu://pelle@test"));
! System.out.println("Getting passphrase... " + dia.getPassPhrase("neu://pelle@test"));
System.exit(0);
--- 68,73 ----
public static void main(String args[]) {
PassPhraseAgent dia = new CommandLineAgent();
! System.out.println("Getting passphrase... " + new String(dia.getPassPhrase("neu://pelle@test")));
! System.out.println("Getting passphrase... " + new String(dia.getPassPhrase("neu://pelle@test")));
System.exit(0);
|
|
From: <pe...@us...> - 2003-11-19 14:37:43
|
Update of /cvsroot/neuclear/neuclear-commons In directory sc8-pr-cvs1:/tmp/cvs-serv8349 Modified Files: project.properties project.xml Log Message: CommandLineAgent now masks the passphrase input using the JLine library which is now a dependency. And the beginnings of a KeyGeneratorApplet Index: project.properties =================================================================== RCS file: /cvsroot/neuclear/neuclear-commons/project.properties,v retrieving revision 1.6 retrieving revision 1.7 diff -C2 -d -r1.6 -r1.7 *** project.properties 15 Nov 2003 01:57:19 -0000 1.6 --- project.properties 19 Nov 2003 14:37:37 -0000 1.7 *************** *** 21,22 **** --- 21,23 ---- maven.repo.remote = http://www.ibiblio.org/maven/,http://dist.codehaus.org/,http://neuclear.org/maven/ maven.test.skip=true + maven.uberjar.main = org.neuclear.commons.crypto.passphraseagents.CommandLineAgent \ No newline at end of file Index: project.xml =================================================================== RCS file: /cvsroot/neuclear/neuclear-commons/project.xml,v retrieving revision 1.10 retrieving revision 1.11 diff -C2 -d -r1.10 -r1.11 *** project.xml 18 Nov 2003 00:01:03 -0000 1.10 --- project.xml 19 Nov 2003 14:37:37 -0000 1.11 *************** *** 86,90 **** <version>2.2</version> </dependency> ! <dependency> --- 86,93 ---- <version>2.2</version> </dependency> ! <dependency> ! <id>jline</id> ! <version>0.8.1</version> ! </dependency> <dependency> |
|
From: <pe...@us...> - 2003-11-19 13:59:04
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/applets In directory sc8-pr-cvs1:/tmp/cvs-serv1881/src/java/org/neuclear/commons/crypto/applets Log Message: Directory /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/applets added to the repository |
|
From: <pe...@us...> - 2003-11-18 23:35:49
|
Update of /cvsroot/neuclear/neuclear-id In directory sc8-pr-cvs1:/tmp/cvs-serv4327 Modified Files: project.properties Log Message: Payment Web Application is getting there. Index: project.properties =================================================================== RCS file: /cvsroot/neuclear/neuclear-id/project.properties,v retrieving revision 1.11 retrieving revision 1.12 diff -C2 -d -r1.11 -r1.12 *** project.properties 18 Nov 2003 15:07:37 -0000 1.11 --- project.properties 18 Nov 2003 23:35:46 -0000 1.12 *************** *** 18,22 **** maven.repo.remote = http://neuclear.org/maven/,http://www.ibiblio.org/maven/,http://dist.codehaus.org/ ! maven.test.skip=false maven.uberjar.main = org.neuclear.signers.commandline.CommandLineSigner maven.repo.central = neuclear.org --- 18,22 ---- maven.repo.remote = http://neuclear.org/maven/,http://www.ibiblio.org/maven/,http://dist.codehaus.org/ ! maven.test.skip=true maven.uberjar.main = org.neuclear.signers.commandline.CommandLineSigner maven.repo.central = neuclear.org |
|
From: <pe...@us...> - 2003-11-18 23:35:49
|
Update of /cvsroot/neuclear/neuclear-id/src/testdata/simple In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/testdata/simple Modified Files: test.id Log Message: Payment Web Application is getting there. Index: test.id =================================================================== RCS file: /cvsroot/neuclear/neuclear-id/src/testdata/simple/test.id,v retrieving revision 1.3 retrieving revision 1.4 diff -C2 -d -r1.3 -r1.4 *** test.id 15 Nov 2003 01:58:21 -0000 1.3 --- test.id 18 Nov 2003 23:35:46 -0000 1.4 *************** *** 1,9 **** ! <neuid:Identity xmlns:neuid="http://neuclear.org/neu/neuid" neuid:name="neu://test" neuid:repository="http://repository.neuclear.org" neuid:logger="mailto:pe...@ne..." neuid:signer="http://users.neuclear.org:8080/Signer" neuid:receiver="mailto:pe...@ne..." neuid:timestamp="2003-11-14T12:11:56,956EST"><neuid:allow><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:KeyValue><ds:RSAKeyValue><ds:Modulus> 8oBM0bU6t/RUQHHI1Q8H6IUf/Pp4ZUF9tUTCNphkG7S4PmpvhxhdJhldrATeNkEPrqUuUqFL1yubLLj2r6uSTw== </ds:Modulus><ds:Exponent> AQAB </ds:Exponent></ds:RSAKeyValue></ds:KeyValue></ds:KeyInfo></neuid:allow><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI=""><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue> ! b4aH2Vgxl6sYsMypZA4OZPajZic= </ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue> ! GQwTH6nB9SfVEnlbqMX7mAD8P7Y65/qovwlz+3sJGOj9gQfPhCv6zm6HGfwjWI7kxxmQkIwAsWec6oCo5vaBJYmXR8eDUVGG2prolw92JoxpO13okBneZEOFgY538g087TCUpopoR35kgYdTnQVew34dbWxVcrCg0OfRVdrCHJT4xvFfqg85C25CNltwlA9CMIuqYNkPmGk/cN9JJBNjw7FDMQrUvsOLHiO+6q5D0rC2fOb4yyv92UmbdhpMns7KY2U4zvgiOoF7mdXaDPxh7kMI+UToO3mneKjHFFwm/T062WZ0xtLeGuDO7SQD1k9O3z1+WeX3+uMoJWCtU/LVcQ== </ds:SignatureValue></ds:Signature></neuid:Identity> --- 1,9 ---- ! <neuid:Identity xmlns:neuid="http://neuclear.org/neu/neuid" neuid:name="neu://test" neuid:repository="http://repository.neuclear.org" neuid:logger="mailto:pe...@ne..." neuid:signer="http://users.neuclear.org:8080/Signer" neuid:receiver="mailto:pe...@ne..." neuid:timestamp="2003-11-18T12:52:44,299EST"><neuid:allow><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:KeyValue><ds:RSAKeyValue><ds:Modulus> 8oBM0bU6t/RUQHHI1Q8H6IUf/Pp4ZUF9tUTCNphkG7S4PmpvhxhdJhldrATeNkEPrqUuUqFL1yubLLj2r6uSTw== </ds:Modulus><ds:Exponent> AQAB </ds:Exponent></ds:RSAKeyValue></ds:KeyValue></ds:KeyInfo></neuid:allow><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI=""><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue> ! DvILFjXY5ulDwjx8AZmDBpZ1IVo= </ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue> ! MwqySLbBdXZggQX4y/4qUquMQmBee+3GRWoXEJP7Kl5VdtOZlk30LISi1ACHEp33vuBeYtXYrlqqZKs0FAzapcGWvghahNZUrPMJbV8VmvlgCe60AU98JkGv1sA636lTYE+QXHkgDK9PS2waeRnrtd5R/5UcFDzjZ6+KyNxI1ju/zLrEvE0BygrOS2h3mdGAvaTAg5P9Wqp93XnF8mwO/SD1RCUDsS0kX2Sma/dUbTdUNCUIxPXzFe0cR+QzKFoOkgqBj9vaS8JPsUPtJbvr5p6kFdrXuI78KjAw15fGdpbmQS8bFITAO0mrkGHlwyAQdoMs8lYrQZdZpEq6rwO25g== </ds:SignatureValue></ds:Signature></neuid:Identity> |
|
From: <pe...@us...> - 2003-11-18 23:35:49
|
Update of /cvsroot/neuclear/neuclear-id/src/webapp In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/webapp Removed Files: login.jsp Log Message: Payment Web Application is getting there. --- login.jsp DELETED --- |
|
From: <pe...@us...> - 2003-11-18 23:35:49
|
Update of /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/store In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/java/org/neuclear/store Modified Files: EncryptedFileStore.java FileStore.java Log Message: Payment Web Application is getting there. Index: EncryptedFileStore.java =================================================================== RCS file: /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/store/EncryptedFileStore.java,v retrieving revision 1.11 retrieving revision 1.12 diff -C2 -d -r1.11 -r1.12 *** EncryptedFileStore.java 18 Nov 2003 19:23:58 -0000 1.11 --- EncryptedFileStore.java 18 Nov 2003 23:35:45 -0000 1.12 *************** *** 2,5 **** --- 2,8 ---- * $Id$ * $Log$ + * Revision 1.12 2003/11/18 23:35:45 pelle + * Payment Web Application is getting there. + * * Revision 1.11 2003/11/18 19:23:58 pelle * Missed this in latest checkin *************** *** 161,175 **** package org.neuclear.store; - import org.neuclear.id.builders.NamedObjectBuilder; - import org.neuclear.id.NSTools; - import org.neuclear.id.SignedNamedObject; - import org.neuclear.commons.crypto.CryptoTools; import org.neuclear.commons.NeuClearException; import javax.crypto.CipherOutputStream; - import javax.crypto.Cipher; - import javax.crypto.NoSuchPaddingException; import java.io.*; - import java.security.NoSuchAlgorithmException; --- 164,175 ---- package org.neuclear.store; import org.neuclear.commons.NeuClearException; + import org.neuclear.commons.crypto.CryptoTools; + import org.neuclear.id.NSTools; + import org.neuclear.id.builders.NamedObjectBuilder; + import javax.crypto.CipherInputStream; import javax.crypto.CipherOutputStream; import java.io.*; *************** *** 188,216 **** File outputFile = new File(outputFilename); outputFile.getParentFile().mkdirs(); ! try { ! Cipher cipher = Cipher.getInstance("AES"); ! //TODO Initialise cipher with key ! return new CipherOutputStream(new FileOutputStream(outputFile),cipher); ! ! ! } catch (NoSuchAlgorithmException e) { ! throw new NeuClearException(e); ! } catch (NoSuchPaddingException e) { ! throw new NeuClearException(e); ! } ! } ! protected FileInputStream getInputStream(String name) throws FileNotFoundException, NeuClearException { String inputFilename = base + getFileName(name); System.out.println("Loading from: " + inputFilename); File fin = new File(inputFilename); if (!fin.exists()) ! throw new NeuClearException("NeuClear: "+name+" doesnt exist"); ! //TODO add CipherInputStream ! return new FileInputStream(fin); } ! protected String getFileName(String name) throws NeuClearException { String deURLizedName = NSTools.normalizeNameURI(name); byte hash[] = CryptoTools.formatAsURLSafe(CryptoTools.digest512(deURLizedName.getBytes())).getBytes(); --- 188,205 ---- File outputFile = new File(outputFilename); outputFile.getParentFile().mkdirs(); ! return new CipherOutputStream(new FileOutputStream(outputFile), CryptoTools.getCipher(CryptoTools.digest256(obj.getName().getBytes()), true)); } ! ! protected InputStream getInputStream(String name) throws FileNotFoundException, NeuClearException { String inputFilename = base + getFileName(name); System.out.println("Loading from: " + inputFilename); File fin = new File(inputFilename); if (!fin.exists()) ! throw new NeuClearException("NeuClear: " + name + " doesnt exist"); ! return new CipherInputStream(new FileInputStream(fin), CryptoTools.getCipher(CryptoTools.digest256(name.getBytes()), false)); } ! protected String getFileName(String name) throws NeuClearException { String deURLizedName = NSTools.normalizeNameURI(name); byte hash[] = CryptoTools.formatAsURLSafe(CryptoTools.digest512(deURLizedName.getBytes())).getBytes(); Index: FileStore.java =================================================================== RCS file: /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/store/FileStore.java,v retrieving revision 1.12 retrieving revision 1.13 diff -C2 -d -r1.12 -r1.13 *** FileStore.java 18 Nov 2003 19:23:58 -0000 1.12 --- FileStore.java 18 Nov 2003 23:35:46 -0000 1.13 *************** *** 2,5 **** --- 2,8 ---- * $Id$ * $Log$ + * Revision 1.13 2003/11/18 23:35:46 pelle + * Payment Web Application is getting there. + * * Revision 1.12 2003/11/18 19:23:58 pelle * Missed this in latest checkin *************** *** 159,164 **** import org.neuclear.id.verifier.VerifyingReader; import org.neuclear.xml.XMLException; - import org.neuclear.xml.XMLTools; - import org.neuclear.xml.xmlsec.XMLSecTools; import java.io.*; --- 162,165 ---- *************** *** 185,189 **** File outputFile = new File(outputFilename); outputFile.getParentFile().mkdirs(); ! OutputStream out=new FileOutputStream(outputFile); return out; } --- 186,190 ---- File outputFile = new File(outputFilename); outputFile.getParentFile().mkdirs(); ! OutputStream out = new FileOutputStream(outputFile); return out; } *************** *** 205,214 **** } ! protected FileInputStream getInputStream(String name) throws FileNotFoundException, NeuClearException { String inputFilename = base + getFileName(name); System.out.println("Loading from: " + inputFilename); File fin = new File(inputFilename); if (!fin.exists()) ! throw new NeuClearException("NeuClear: "+name+" doesnt exist"); return new FileInputStream(fin); --- 206,215 ---- } ! protected InputStream getInputStream(String name) throws FileNotFoundException, NeuClearException { String inputFilename = base + getFileName(name); System.out.println("Loading from: " + inputFilename); File fin = new File(inputFilename); if (!fin.exists()) ! throw new NeuClearException("NeuClear: " + name + " doesnt exist"); return new FileInputStream(fin); *************** *** 217,221 **** protected String getFileName(String name) throws NeuClearException { ! return NSTools.url2path(name)+"/root.id"; } --- 218,222 ---- protected String getFileName(String name) throws NeuClearException { ! return NSTools.url2path(name) + "/root.id"; } |
|
From: <pe...@us...> - 2003-11-18 23:35:48
|
Update of /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/signers/servlet
In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/java/org/neuclear/signers/servlet
Modified Files:
SigningServlet.java
Log Message:
Payment Web Application is getting there.
Index: SigningServlet.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/signers/servlet/SigningServlet.java,v
retrieving revision 1.12
retrieving revision 1.13
diff -C2 -d -r1.12 -r1.13
*** SigningServlet.java 18 Nov 2003 00:01:55 -0000 1.12
--- SigningServlet.java 18 Nov 2003 23:35:45 -0000 1.13
***************
*** 2,5 ****
--- 2,8 ----
* $Id$
* $Log$
+ * Revision 1.13 2003/11/18 23:35:45 pelle
+ * Payment Web Application is getting there.
+ *
* Revision 1.12 2003/11/18 00:01:55 pelle
* The sample signing web application for logging in and out is now working.
***************
*** 166,169 ****
--- 169,173 ----
import org.neuclear.commons.Utility;
import org.neuclear.commons.crypto.Base64;
+ import org.neuclear.commons.crypto.passphraseagents.PassPhraseAgent;
import org.neuclear.commons.crypto.signers.InvalidPassphraseException;
import org.neuclear.commons.crypto.signers.NonExistingSignerException;
***************
*** 188,202 ****
import java.io.PrintWriter;
import java.security.GeneralSecurityException;
! public class SigningServlet extends ReceiverServlet {
public void init(ServletConfig config) throws ServletException {
System.out.println("NEUDIST: Initialising SigningServlet");
super.init(config);
context = config.getServletContext();
try {
System.out.println("NEUDIST: Initialising SigningServlet");
title = Utility.denullString(config.getInitParameter("title").toString(), "NeuClear Signing Service");
if (signer == null) {
! signer = new TestCaseSigner();
}
System.out.println("NEUDIST: Finished SigningServlet Init ");
--- 192,209 ----
import java.io.PrintWriter;
import java.security.GeneralSecurityException;
+ import java.util.HashMap;
+ import java.util.Map;
! public class SigningServlet extends ReceiverServlet implements PassPhraseAgent {
public void init(ServletConfig config) throws ServletException {
System.out.println("NEUDIST: Initialising SigningServlet");
super.init(config);
context = config.getServletContext();
+ reqMap = new HashMap();
try {
System.out.println("NEUDIST: Initialising SigningServlet");
title = Utility.denullString(config.getInitParameter("title").toString(), "NeuClear Signing Service");
if (signer == null) {
! signer = new TestCaseSigner(this);
}
System.out.println("NEUDIST: Finished SigningServlet Init ");
***************
*** 223,226 ****
--- 230,234 ----
return;
}
+ reqMap.put(Thread.currentThread(), request);
response.setHeader("Pragma", "no-cache");
response.setDateHeader("Expires", 0);
***************
*** 305,312 ****
out.print(XMLSecTools.encodeElementBase64(named));
out.println("\" type=\"hidden\"/>");
! out.write("<input type=\"submit\">");
out.write("</form>\n");
out.write("<script language=\"javascript\">\n");
! // out.write("<!--\n document.forms[0].submit();\n-->\n");
out.write("</script>\n");
--- 313,320 ----
out.print(XMLSecTools.encodeElementBase64(named));
out.println("\" type=\"hidden\"/>");
! // out.write("<input type=\"submit\">");
out.write("</form>\n");
out.write("<script language=\"javascript\">\n");
! out.write("<!--\n document.forms[0].submit();\n-->\n");
out.write("</script>\n");
***************
*** 320,323 ****
--- 328,332 ----
}
out.println("<p align\"left\"><img src=\"images/neubia40x40.png\"><br><a href=\"http://www.neubia.com\"><i>© 2002 Antilles Software Ventures SA</i></a></body></html>");
+ reqMap.remove(Thread.currentThread()); //Super Important
}
***************
*** 335,338 ****
--- 344,365 ----
}
+ /**
+ * Retrieve the PassPhrase for a given name/alias
+ *
+ * @param name
+ * @return
+ */
+ public char[] getPassPhrase(String name) {
+ if (reqMap == null)
+ return null;
+ HttpServletRequest request = (HttpServletRequest) reqMap.get(Thread.currentThread());
+ if (request == null)
+ return null;
+ String passphrase = request.getParameter("passphrase");
+ if (passphrase == null)
+ return null;
+ return passphrase.toCharArray();
+ }
+
/*
public Element receiveNamedObject(SignedNamedObject obj, String soapAction) throws SOAPException {
***************
*** 376,378 ****
--- 403,406 ----
private String id;
private String title;
+ private Map reqMap;
}
|
|
From: <pe...@us...> - 2003-11-18 23:35:48
|
Update of /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/id
In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/java/org/neuclear/id
Modified Files:
NSTools.java
Log Message:
Payment Web Application is getting there.
Index: NSTools.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/id/NSTools.java,v
retrieving revision 1.13
retrieving revision 1.14
diff -C2 -d -r1.13 -r1.14
*** NSTools.java 11 Nov 2003 21:18:43 -0000 1.13
--- NSTools.java 18 Nov 2003 23:35:45 -0000 1.14
***************
*** 2,5 ****
--- 2,8 ----
* $Id$
* $Log$
+ * Revision 1.14 2003/11/18 23:35:45 pelle
+ * Payment Web Application is getting there.
+ *
* Revision 1.13 2003/11/11 21:18:43 pelle
* Further vital reshuffling.
***************
*** 143,148 ****
import org.dom4j.Namespace;
import org.neuclear.commons.NeuClearException;
- import org.neuclear.commons.crypto.CryptoTools;
import org.neuclear.commons.Utility;
import java.util.Random;
--- 146,151 ----
import org.dom4j.Namespace;
import org.neuclear.commons.NeuClearException;
import org.neuclear.commons.Utility;
+ import org.neuclear.commons.crypto.CryptoTools;
import java.util.Random;
***************
*** 163,167 ****
public static String normalizeNameURI(String name) throws NeuClearException {
if (!isValidName(name))
! throw new NeuClearException("Name: '" + name + "' is not valid");
if (!name.startsWith("neu://"))
return "neu:/" + name;
--- 166,170 ----
public static String normalizeNameURI(String name) throws NeuClearException {
if (!isValidName(name))
! throw new InvalidNamedObject("Name: '" + name + "' is not valid");
if (!name.startsWith("neu://"))
return "neu:/" + name;
|
|
From: <pe...@us...> - 2003-11-18 23:35:48
|
Update of /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/auth
In directory sc8-pr-cvs1:/tmp/cvs-serv4327/src/java/org/neuclear/auth
Modified Files:
AuthenticationServlet.java
Log Message:
Payment Web Application is getting there.
Index: AuthenticationServlet.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-id/src/java/org/neuclear/auth/AuthenticationServlet.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -C2 -d -r1.4 -r1.5
*** AuthenticationServlet.java 15 Nov 2003 01:58:16 -0000 1.4
--- AuthenticationServlet.java 18 Nov 2003 23:35:45 -0000 1.5
***************
*** 43,46 ****
--- 43,49 ----
$Id$
$Log$
+ Revision 1.5 2003/11/18 23:35:45 pelle
+ Payment Web Application is getting there.
+
Revision 1.4 2003/11/15 01:58:16 pelle
More work all around on web applications.
***************
*** 118,122 ****
try {
AuthenticationTicketBuilder authreq = new AuthenticationTicketBuilder(userns, serviceid, request.getRequestURI());
! SignatureRequestBuilder sigreq = new SignatureRequestBuilder("neu://test", userns, authreq, "Login to Site");
sigreq.sign(serviceid, signer);
request.getSession(true).setAttribute("auth", userns);
--- 121,125 ----
try {
AuthenticationTicketBuilder authreq = new AuthenticationTicketBuilder(userns, serviceid, request.getRequestURI());
! SignatureRequestBuilder sigreq = new SignatureRequestBuilder(serviceid, userns, authreq, "Login to Site");
sigreq.sign(serviceid, signer);
request.getSession(true).setAttribute("auth", userns);
|
|
From: <pe...@us...> - 2003-11-18 23:35:21
|
Update of /cvsroot/neuclear/neuclear-xmlsig/src/test/org/neuclear/xml/xmlsec In directory sc8-pr-cvs1:/tmp/cvs-serv4275/src/test/org/neuclear/xml/xmlsec Modified Files: SimpleXMLSigTest.java Log Message: Payment Web Application is getting there. Index: SimpleXMLSigTest.java =================================================================== RCS file: /cvsroot/neuclear/neuclear-xmlsig/src/test/org/neuclear/xml/xmlsec/SimpleXMLSigTest.java,v retrieving revision 1.2 retrieving revision 1.3 diff -C2 -d -r1.2 -r1.3 *** SimpleXMLSigTest.java 11 Nov 2003 21:18:08 -0000 1.2 --- SimpleXMLSigTest.java 18 Nov 2003 23:35:18 -0000 1.3 *************** *** 22,25 **** --- 22,28 ---- * $Id$ * $Log$ + * Revision 1.3 2003/11/18 23:35:18 pelle + * Payment Web Application is getting there. + * * Revision 1.2 2003/11/11 21:18:08 pelle * Further vital reshuffling. *************** *** 27,45 **** * org.neuclear.signers.* as well as org.neuclear.passphraseagents have been moved under org.neuclear.commons.crypto as well. * Did a bit of work on the Canonicalizer and changed a few other minor bits. ! * * Revision 1.1.1.1 2003/11/11 16:33:32 pelle * Moved over from neudist.org * Moved remaining common utilities into commons ! * * Revision 1.9 2003/10/21 22:30:34 pelle * Renamed NeudistException to NeuClearException and moved it to org.neuclear.commons where it makes more sense. * Unhooked the XMLException in the xmlsig library from NeuClearException to make all of its exceptions an independent hierarchy. * Obviously had to perform many changes throughout the code to support these changes. ! * * Revision 1.8 2003/02/24 12:57:56 pelle * Sorted out problem with signing enveloping signatures. * Canonicalizer needs a Document. If there isn't a Document the xpath wont work and returns false. * Thus always have a document for an element. ! * * Revision 1.7 2003/02/24 03:26:30 pelle * XMLSignature class has been tested as working for Enveloped Signatures. --- 30,48 ---- * org.neuclear.signers.* as well as org.neuclear.passphraseagents have been moved under org.neuclear.commons.crypto as well. * Did a bit of work on the Canonicalizer and changed a few other minor bits. ! * <p/> * Revision 1.1.1.1 2003/11/11 16:33:32 pelle * Moved over from neudist.org * Moved remaining common utilities into commons ! * <p/> * Revision 1.9 2003/10/21 22:30:34 pelle * Renamed NeudistException to NeuClearException and moved it to org.neuclear.commons where it makes more sense. * Unhooked the XMLException in the xmlsig library from NeuClearException to make all of its exceptions an independent hierarchy. * Obviously had to perform many changes throughout the code to support these changes. ! * <p/> * Revision 1.8 2003/02/24 12:57:56 pelle * Sorted out problem with signing enveloping signatures. * Canonicalizer needs a Document. If there isn't a Document the xpath wont work and returns false. * Thus always have a document for an element. ! * <p/> * Revision 1.7 2003/02/24 03:26:30 pelle * XMLSignature class has been tested as working for Enveloped Signatures. *************** *** 47,56 **** * It failes while checking reference validity. This means there is something strange about the Digest is initially * calculated for Enveloping signatures. ! * * Revision 1.6 2003/02/21 22:48:20 pelle * New Test Infrastructure * Added test keys in src/testdata/keys * Modified tools to handle these keys ! * * Revision 1.5 2003/02/20 13:26:42 pelle * Adding all of the modification from Rams?s Morales ra...@co... to support DSASHA1 Signatures --- 50,59 ---- * It failes while checking reference validity. This means there is something strange about the Digest is initially * calculated for Enveloping signatures. ! * <p/> * Revision 1.6 2003/02/21 22:48:20 pelle * New Test Infrastructure * Added test keys in src/testdata/keys * Modified tools to handle these keys ! * <p/> * Revision 1.5 2003/02/20 13:26:42 pelle * Adding all of the modification from Rams?s Morales ra...@co... to support DSASHA1 Signatures *************** *** 60,68 **** * - DSA Key Generation within CryptoTools * - Signing using DSASHA1 ! * * Revision 1.4 2003/02/11 14:50:26 pelle * Trying onemore time. Added the benchmarking code. * Now generates DigestValue and optionally adds KeyInfo to Signature. ! * * Revision 1.3 2003/02/08 20:55:09 pelle * Some documentation changes. --- 63,71 ---- * - DSA Key Generation within CryptoTools * - Signing using DSASHA1 ! * <p/> * Revision 1.4 2003/02/11 14:50:26 pelle * Trying onemore time. Added the benchmarking code. * Now generates DigestValue and optionally adds KeyInfo to Signature. ! * <p/> * Revision 1.3 2003/02/08 20:55:09 pelle * Some documentation changes. *************** *** 70,74 **** * get rid of the org.neuclear.utils package and split out the org.neuclear.xml.soap package. * Got rid of tons of unnecessary dependencies. ! * * Revision 1.2 2003/02/08 18:48:38 pelle * The Signature phase has been rewritten. --- 73,77 ---- * get rid of the org.neuclear.utils package and split out the org.neuclear.xml.soap package. * Got rid of tons of unnecessary dependencies. ! * <p/> * Revision 1.2 2003/02/08 18:48:38 pelle * The Signature phase has been rewritten. *************** *** 81,186 **** * And CanonicalizerWithoutSignature which leaves out the Signature in the Canonicalization phase and is thus * a lot more efficient than the previous approach. ! * * Revision 1.1 2003/01/21 03:14:12 pelle * Mainly clean ups through out and further documentation. - * */ ! public class SimpleXMLSigTest extends TestCase { public SimpleXMLSigTest(String s) throws SecurityException, NoSuchAlgorithmException, CryptoException { super(s); ! signer=JunitTools.getTestRSAKey(); dsaSigner = JunitTools.getTestDSAKey(); } ! public void testRSASignXML() throws DocumentException, XMLException, CryptoException { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSignature sig=new XMLSignature(signer,doc.getRootElement(),"http://testsigs"); ! File outputFile = new File("src/testdata/homegrown/signature-enveloped-rsa.xml"); ! XMLTools.writeFile(outputFile,doc); ! doc=XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); } public void testRSAEnvelopingSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSignature sig=new XMLSignature(signer,doc.getRootElement(),"http://testsigs",Reference.XMLSIGTYPE_ENVELOPING); ! File outputFile = new File("src/testdata/homegrown/signature-enveloping-rsa.xml"); ! XMLTools.writeFile(outputFile,sig.getElement()); ! doc=XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); } public void testDSAEnvelopingSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSignature sig=new XMLSignature(dsaSigner,doc.getRootElement(),"http://testsigs",Reference.XMLSIGTYPE_ENVELOPING); ! File outputFile = new File("src/testdata/homegrown/signature-enveloping-dsa.xml"); ! XMLTools.writeFile(outputFile,sig.getElement()); ! doc=XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); } public void testDSASignXML() ! throws DocumentException, XMLException, CryptoException ! { ! assertTrue("Test if public key is really DSA", dsaSigner.getPublic() instanceof DSAPublicKey); ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSignature sig=new XMLSignature(dsaSigner,doc.getRootElement(),"http://testDSAsigs"); ! File outputFile = new File("src/testdata/homegrown/signature-enveloped-dsa.xml"); ! XMLTools.writeFile(outputFile,doc); - doc=XMLTools.loadDocument(outputFile); - assertTrue("Test if DSA Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); - } public void testQuickRSASignXML() throws DocumentException, XMLException, CryptoException { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testsigs",doc.getRootElement(),signer); ! File outputFile = new File("src/testdata/homegrown/signature-enveloped-rsa-quick.xml"); ! XMLTools.writeFile(outputFile,doc); ! doc=XMLTools.loadDocument(outputFile); ! assertTrue("Test if RSA Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); } public void testQuickDSASignXML() ! throws DocumentException, XMLException, CryptoException ! { ! assertTrue("Test if public key is really DSA", dsaSigner.getPublic() instanceof DSAPublicKey); ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testDSAsigs", doc.getRootElement(), dsaSigner); ! File outputFile = new File("src/testdata/homegrown/signature-enveloped-dsa-quick.xml"); ! XMLTools.writeFile(outputFile,doc); ! doc=XMLTools.loadDocument(outputFile); ! assertTrue("Test if DSA Signature is valid",XMLSecTools.verifySignature(doc.getRootElement())); ! } public void testBadSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testsigs",doc.getRootElement(),signer); ! assertTrue("Test if Signature is valid",XMLSecTools.verifySignature(doc.getRootElement(),signer.getPublic())); doc.getRootElement().addElement("BadElement"); ! assertTrue("Test that Signature is invalid",!XMLSecTools.verifySignature(doc.getRootElement(),signer.getPublic())); } ! public void testBadDSASignXML() ! throws DocumentException, XMLException, CryptoException ! { ! Document doc=DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testDSAsigs",doc.getRootElement(), dsaSigner); ! assertTrue("Test if DSA Signature is valid",XMLSecTools.verifySignature(doc.getRootElement(), dsaSigner.getPublic())); ! doc.getRootElement().addElement("BadElement"); ! assertTrue("Test that DSA Signature is invalid",!XMLSecTools.verifySignature(doc.getRootElement(),signer.getPublic())); ! } KeyPair signer, dsaSigner; ! final static String TESTXML="<test><test2></test2></test>"; } --- 84,187 ---- * And CanonicalizerWithoutSignature which leaves out the Signature in the Canonicalization phase and is thus * a lot more efficient than the previous approach. ! * <p/> * Revision 1.1 2003/01/21 03:14:12 pelle * Mainly clean ups through out and further documentation. */ ! public class SimpleXMLSigTest extends TestCase { public SimpleXMLSigTest(String s) throws SecurityException, NoSuchAlgorithmException, CryptoException { super(s); ! signer = JunitTools.getTestRSAKey(); dsaSigner = JunitTools.getTestDSAKey(); } ! public void testRSASignXML() throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSignature sig = new XMLSignature(signer, doc.getRootElement(), "http://testsigs"); ! File outputFile = new File("target/testdata/homegrown/signature-enveloped-rsa.xml"); ! XMLTools.writeFile(outputFile, doc); ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); } + public void testRSAEnvelopingSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSignature sig = new XMLSignature(signer, doc.getRootElement(), "http://testsigs", Reference.XMLSIGTYPE_ENVELOPING); ! File outputFile = new File("target/src/testdata/homegrown/signature-enveloping-rsa.xml"); ! XMLTools.writeFile(outputFile, sig.getElement()); ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); } public void testDSAEnvelopingSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSignature sig = new XMLSignature(dsaSigner, doc.getRootElement(), "http://testsigs", Reference.XMLSIGTYPE_ENVELOPING); ! File outputFile = new File("target/src/testdata/homegrown/signature-enveloping-dsa.xml"); ! XMLTools.writeFile(outputFile, sig.getElement()); ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); } public void testDSASignXML() ! throws DocumentException, XMLException, CryptoException { ! assertTrue("Test if public key is really DSA", dsaSigner.getPublic() instanceof DSAPublicKey); ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSignature sig = new XMLSignature(dsaSigner, doc.getRootElement(), "http://testDSAsigs"); ! File outputFile = new File("target/src/testdata/homegrown/signature-enveloped-dsa.xml"); ! XMLTools.writeFile(outputFile, doc); ! ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if DSA Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); ! } public void testQuickRSASignXML() throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testsigs", doc.getRootElement(), signer); ! File outputFile = new File("target/src/testdata/homegrown/signature-enveloped-rsa-quick.xml"); ! XMLTools.writeFile(outputFile, doc); ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if RSA Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); } public void testQuickDSASignXML() ! throws DocumentException, XMLException, CryptoException { ! assertTrue("Test if public key is really DSA", dsaSigner.getPublic() instanceof DSAPublicKey); ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testDSAsigs", doc.getRootElement(), dsaSigner); ! File outputFile = new File("target/testdata/homegrown/signature-enveloped-dsa-quick.xml"); ! XMLTools.writeFile(outputFile, doc); ! doc = XMLTools.loadDocument(outputFile); ! assertTrue("Test if DSA Signature is valid", XMLSecTools.verifySignature(doc.getRootElement())); ! } public void testBadSignXML() throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testsigs", doc.getRootElement(), signer); ! assertTrue("Test if Signature is valid", XMLSecTools.verifySignature(doc.getRootElement(), signer.getPublic())); doc.getRootElement().addElement("BadElement"); ! assertTrue("Test that Signature is invalid", !XMLSecTools.verifySignature(doc.getRootElement(), signer.getPublic())); } ! public void testBadDSASignXML() ! throws DocumentException, XMLException, CryptoException { ! Document doc = DocumentHelper.parseText(TESTXML); ! XMLSecTools.signElement("http://testDSAsigs", doc.getRootElement(), dsaSigner); ! assertTrue("Test if DSA Signature is valid", XMLSecTools.verifySignature(doc.getRootElement(), dsaSigner.getPublic())); ! doc.getRootElement().addElement("BadElement"); ! assertTrue("Test that DSA Signature is invalid", !XMLSecTools.verifySignature(doc.getRootElement(), signer.getPublic())); ! } KeyPair signer, dsaSigner; ! final static String TESTXML = "<test><test2></test2></test>"; } |
|
From: <pe...@us...> - 2003-11-18 23:34:59
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/sql
In directory sc8-pr-cvs1:/tmp/cvs-serv4173/src/java/org/neuclear/commons/sql
Added Files:
JNDIConnectionSource.java
Log Message:
Payment Web Application is getting there.
--- NEW FILE: JNDIConnectionSource.java ---
package org.neuclear.commons.sql;
import javax.naming.InitialContext;
import javax.naming.NamingException;
import javax.sql.DataSource;
import java.io.IOException;
import java.sql.Connection;
import java.sql.SQLException;
/*
NeuClear Distributed Transaction Clearing Platform
(C) 2003 Pelle Braendgaard
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
$Id: JNDIConnectionSource.java,v 1.1 2003/11/18 23:34:55 pelle Exp $
$Log: JNDIConnectionSource.java,v $
Revision 1.1 2003/11/18 23:34:55 pelle
Payment Web Application is getting there.
*/
/**
* User: pelleb
* Date: Nov 18, 2003
* Time: 6:09:37 PM
*/
public class JNDIConnectionSource implements ConnectionSource {
public JNDIConnectionSource(String name) throws NamingException {
InitialContext ctx = new InitialContext();
this.ds = (DataSource) ctx.lookup(name);
}
public Connection getConnection() throws SQLException, IOException {
return ds.getConnection();
}
private final DataSource ds;
}
|
|
From: <pe...@us...> - 2003-11-18 23:34:58
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto
In directory sc8-pr-cvs1:/tmp/cvs-serv4173/src/java/org/neuclear/commons/crypto
Modified Files:
CryptoTools.java
Log Message:
Payment Web Application is getting there.
Index: CryptoTools.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/CryptoTools.java,v
retrieving revision 1.1
retrieving revision 1.2
diff -C2 -d -r1.1 -r1.2
*** CryptoTools.java 11 Nov 2003 21:17:48 -0000 1.1
--- CryptoTools.java 18 Nov 2003 23:34:55 -0000 1.2
***************
*** 2,5 ****
--- 2,8 ----
* $Id$
* $Log$
+ * Revision 1.2 2003/11/18 23:34:55 pelle
+ * Payment Web Application is getting there.
+ *
* Revision 1.1 2003/11/11 21:17:48 pelle
* Further vital reshuffling.
***************
*** 179,185 ****
--- 182,190 ----
import javax.crypto.Cipher;
+ import javax.crypto.NoSuchPaddingException;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
+ import javax.crypto.spec.SecretKeySpec;
import java.io.IOException;
import java.math.BigInteger;
***************
*** 191,194 ****
--- 196,200 ----
import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;
+ import java.security.spec.KeySpec;
import java.security.spec.RSAPublicKeySpec;
import java.security.spec.X509EncodedKeySpec;
***************
*** 344,347 ****
--- 350,375 ----
}
+ public static Cipher getCipher(byte key[], boolean doencrypt) throws CryptoException {
+ try {
+ Cipher cipher = Cipher.getInstance("AES", "BC");
+ KeySpec keyspec = new SecretKeySpec(key, "AES");
+ SecretKeyFactory kf = SecretKeyFactory.getInstance("AES", "BC");
+ Key skey = kf.generateSecret(keyspec);
+ cipher.init(doencrypt ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE, skey);
+ return cipher;
+ } catch (NoSuchAlgorithmException e) {
+ rethrowException(e);
+ } catch (NoSuchPaddingException e) {
+ rethrowException(e);
+ } catch (InvalidKeySpecException e) {
+ rethrowException(e);
+ } catch (InvalidKeyException e) {
+ rethrowException(e);
+ } catch (NoSuchProviderException e) {
+ rethrowException(e);
+ }
+ return null;
+ }
+
public static byte[] sign(KeyPair kp, byte value[]) throws CryptoException {
return sign(kp.getPrivate(), value);
***************
*** 675,678 ****
--- 703,710 ----
return asn1Bytes;
+ }
+
+ {
+ ensureProvider();
}
|
|
From: <pe...@us...> - 2003-11-18 23:34:58
|
Update of /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/signers
In directory sc8-pr-cvs1:/tmp/cvs-serv4173/src/java/org/neuclear/commons/crypto/signers
Modified Files:
TestCaseSigner.java
Log Message:
Payment Web Application is getting there.
Index: TestCaseSigner.java
===================================================================
RCS file: /cvsroot/neuclear/neuclear-commons/src/java/org/neuclear/commons/crypto/signers/TestCaseSigner.java,v
retrieving revision 1.4
retrieving revision 1.5
diff -C2 -d -r1.4 -r1.5
*** TestCaseSigner.java 18 Nov 2003 15:07:18 -0000 1.4
--- TestCaseSigner.java 18 Nov 2003 23:34:55 -0000 1.5
***************
*** 3,6 ****
--- 3,7 ----
import org.neuclear.commons.NeuClearException;
import org.neuclear.commons.crypto.passphraseagents.AlwaysTheSamePassphraseAgent;
+ import org.neuclear.commons.crypto.passphraseagents.PassPhraseAgent;
import java.io.InputStream;
***************
*** 28,31 ****
--- 29,35 ----
$Id$
$Log$
+ Revision 1.5 2003/11/18 23:34:55 pelle
+ Payment Web Application is getting there.
+
Revision 1.4 2003/11/18 15:07:18 pelle
Changes to JCE Implementation
***************
*** 66,69 ****
--- 70,77 ----
}
+ public TestCaseSigner(PassPhraseAgent agent) throws GeneralSecurityException, NeuClearException {
+ this(KEYSTORE, getKeyStore(), agent);
+ }
+
/**
* Creates a TestCaseSigner in the given location. The keystore must
***************
*** 77,85 ****
*/
public TestCaseSigner(String name, InputStream in, String passphrase) throws NeuClearException, GeneralSecurityException {
super(name,
in,
"jks", "SUN",
! //new GuiDialogAgent()
! new AlwaysTheSamePassphraseAgent(passphrase)
);
}
--- 85,96 ----
*/
public TestCaseSigner(String name, InputStream in, String passphrase) throws NeuClearException, GeneralSecurityException {
+ this(name, in, new AlwaysTheSamePassphraseAgent(passphrase));
+ }
+
+ public TestCaseSigner(String name, InputStream in, PassPhraseAgent agent) throws NeuClearException, GeneralSecurityException {
super(name,
in,
"jks", "SUN",
! agent
);
}
|
|
From: <pe...@us...> - 2003-11-18 23:34:33
|
Update of /cvsroot/neuclear/neuclear-pay
In directory sc8-pr-cvs1:/tmp/cvs-serv4114
Modified Files:
project.xml
Log Message:
Payment Web Application is getting there.
Index: project.xml
===================================================================
RCS file: /cvsroot/neuclear/neuclear-pay/project.xml,v
retrieving revision 1.10
retrieving revision 1.11
diff -C2 -d -r1.10 -r1.11
*** project.xml 12 Nov 2003 23:47:05 -0000 1.10
--- project.xml 18 Nov 2003 23:34:30 -0000 1.11
***************
*** 95,99 ****
<version>0.10</version>
<properties>
! <war.bundle.jar>true</war.bundle.jar>
</properties>
</dependency>
--- 95,99 ----
<version>0.10</version>
<properties>
! <war.bundle>true</war.bundle>
</properties>
</dependency>
***************
*** 104,108 ****
<jar>commons-collections-2.1.jar</jar>
<properties>
! <war.bundle.jar>true</war.bundle.jar>
</properties>
</dependency>
--- 104,108 ----
<jar>commons-collections-2.1.jar</jar>
<properties>
! <war.bundle>true</war.bundle>
</properties>
</dependency>
***************
*** 112,116 ****
<jar>dom4j-1.4.jar</jar>
<properties>
! <war.bundle.jar>true</war.bundle.jar>
</properties>
</dependency>
--- 112,116 ----
<jar>dom4j-1.4.jar</jar>
<properties>
! <war.bundle>true</war.bundle>
</properties>
</dependency>
***************
*** 126,130 ****
<jar>jce-jdk13-115.jar</jar>
<properties>
! <war.bundle.jar>false</war.bundle.jar>
</properties>
</dependency>
--- 126,130 ----
<jar>jce-jdk13-115.jar</jar>
<properties>
! <war.bundle>false</war.bundle>
</properties>
</dependency>
***************
*** 143,147 ****
<version>2.0-beta13</version>
<properties>
! <war.bundle.jar>true</war.bundle.jar>
</properties>
</dependency>
--- 143,147 ----
<version>2.0-beta13</version>
<properties>
! <war.bundle>true</war.bundle>
</properties>
</dependency>
***************
*** 158,161 ****
--- 158,168 ----
<url>http://java.sun.com/products/javabeans/glasgow/jaf.html</url>
</dependency>
+ <dependency>
+ <id>jstl</id>
+ <version>1.0.2</version>
+ <properties>
+ <war.bundle>true</war.bundle>
+ </properties>
+ </dependency>
</dependencies>
|
|
From: <pe...@us...> - 2003-11-18 23:34:33
|
Update of /cvsroot/neuclear/neuclear-pay/src/webapp
In directory sc8-pr-cvs1:/tmp/cvs-serv4114/src/webapp
Added Files:
index.jsp
Log Message:
Payment Web Application is getting there.
--- NEW FILE: index.jsp ---
<%@ page import="org.neuclear.commons.Utility,
org.neuclear.id.SignedNamedObject,
org.neuclear.auth.AuthenticationTicket,
org.neuclear.id.NSTools,
org.neuclear.commons.servlets.ServletTools ,
org.neuclear.id.Identity,
org.neuclear.id.resolver.NSResolver"%>
<%
response.setHeader("Pragma","no-cache");
response.setDateHeader("Expires",0);
Identity userns=(Identity) request.getUserPrincipal();
boolean loggedin=userns!=null;
%>
<html>
<head><title>
NeuClear Bux
</title></head>
<body>
<h1>NeuClear Sample Electronic Currency</h1>
<%
if(!loggedin){
%>
<form action="/Authorize" method="POST">
<table bgcolor="#FFFFE0"><tr><td valign="top">
<input name="identity" value="<%=(userns!=null)?userns.getName():""%>" type="text" size="30">
</td><td valign="top">
<input type="submit" name="submit" value="Login">
</td>
</tr>
<tr><td colspan="2" bgcolor="#F0F0FF">
Try logging in using the example neu's below:<br>
<pre>
neu://bob@test
neu://alice@test
</pre>
Use the passphrase: "<tt>neuclear</tt>" when asked.
</td></tr></table>
</form>
<%
} else {
%>
<%=userns.getName()%> is Logged In<br><hr>
<ul>
<li><a href="SECURE/transfer.jsp">Transfer Funds</a></li>
<li><a href="SECURE/statement.jsp">Statement</a></li>
<li><a href="<%=ServletTools.getAbsoluteURL(request,"/")%>?logout=1">Log Out</a></li>
</ul>
<%
}
%>
</body>
</html>
|
|
From: <pe...@us...> - 2003-11-18 23:34:33
|
Update of /cvsroot/neuclear/neuclear-pay/src/webapp/WEB-INF
In directory sc8-pr-cvs1:/tmp/cvs-serv4114/src/webapp/WEB-INF
Added Files:
web.xml
Log Message:
Payment Web Application is getting there.
--- NEW FILE: web.xml ---
<!DOCTYPE web-app
PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
"http://java.sun.com/j2ee/dtds/web-app_2_3.dtd">
<web-app>
<display-name>NeuClear Pay WebApp</display-name>
<description>
AssetController App
</description>
<filter>
<filter-name>authfilter</filter-name>
<filter-class>org.neuclear.auth.AuthenticationFilter</filter-class>
<init-param>
<param-name>serviceid</param-name>
<param-value>neu://test/bux</param-value>
</init-param>
</filter>
<servlet>
<servlet-name>authenticator</servlet-name>
<servlet-class>org.neuclear.auth.AuthenticationServlet</servlet-class>
<init-param>
<param-name>title</param-name>
<param-value>NeuClear Example Application</param-value>
</init-param>
<init-param>
<param-name>serviceid</param-name>
<param-value>neu://test</param-value>
</init-param>
<load-on-startup>1</load-on-startup>
</servlet>
<filter-mapping>
<filter-name>authfilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
<servlet-mapping>
<servlet-name>authenticator</servlet-name>
<url-pattern>/Authorize</url-pattern>
</servlet-mapping>
<welcome-file-list>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>
</web-app>
|
|
From: <pe...@us...> - 2003-11-18 23:34:33
|
Update of /cvsroot/neuclear/neuclear-pay/src/webapp/SECURE
In directory sc8-pr-cvs1:/tmp/cvs-serv4114/src/webapp/SECURE
Added Files:
transfer.jsp
Log Message:
Payment Web Application is getting there.
--- NEW FILE: transfer.jsp ---
<%@ page import="org.neuclear.id.Identity,
org.neuclear.commons.Utility,
org.neuclear.asset.contracts.builders.TransferRequestBuilder,
org.neuclear.id.resolver.NSResolver,
org.neuclear.asset.contracts.Asset,
org.neuclear.commons.time.TimeTools,
org.neuclear.id.builders.SignatureRequestBuilder"%>
<%@ taglib uri="http://java.sun.com/jsp/jstl/sql" prefix="sql" %>
<%
Identity userns=(Identity) request.getUserPrincipal();
String recipient=Utility.denullString(request.getParameter("recipient"));
double amount=Double.parseDouble(Utility.denullString(request.getParameter("amount"),"0"));
boolean submit=!Utility.isEmpty(request.getParameter("submit"));
String comment=Utility.denullString(request.getParameter("comment"));
%>
<html><head><title>Transfer - <%=userns.getName()%></title></head>
<body>
<h1>Transfer Funds</h1>
<%
if (!submit){
%>
<p>
Use this screen to perform a transfer of funds to another id.
</p>
<p>
<form action="transfer.jsp" method="POST">
<p>Account: <%=userns.getName()%></p>
<p>Recipient:
<input type="text" name="recipient" value="<%=recipient%>"/></p>
<p>Amount:
<input type="text" name="recipient" value="<%=amount%>"/></p>
<p>Comment:
<input type="text" name="comment" value="<%=comment%>"/></p>
<p><input type="submit" name="submit" value="Verify"/></p>
</form>
</p>
<% } else {
TransferRequestBuilder transfer=new TransferRequestBuilder(
(Asset)NSResolver.resolveIdentity("neu://test/bux"),
userns,
NSResolver.resolveIdentity(recipient),
amount,
TimeTools.now(),
comment
) ;
SignatureRequestBuilder sigreq=new SignatureRequestBuilder("neu://test/bux",userns.getName(),transfer,comment);
%>
Transfering to Signing Server
<%
}
%>
</body>
</html>
|
|
From: <pe...@us...> - 2003-11-18 23:34:33
|
Update of /cvsroot/neuclear/neuclear-pay/src/java/org/neuclear/asset/receiver/servlet
In directory sc8-pr-cvs1:/tmp/cvs-serv4114/src/java/org/neuclear/asset/receiver/servlet
Added Files:
AssetControllerServlet.java
Log Message:
Payment Web Application is getting there.
--- NEW FILE: AssetControllerServlet.java ---
package org.neuclear.asset.receiver.servlet;
import org.neuclear.asset.contracts.Asset;
import org.neuclear.asset.controllers.currency.CurrencyController;
import org.neuclear.asset.receiver.AssetControllerReceiver;
import org.neuclear.commons.crypto.signers.TestCaseSigner;
import org.neuclear.commons.sql.JNDIConnectionSource;
import org.neuclear.id.resolver.NSResolver;
import org.neuclear.ledger.implementations.SQLLedger;
import org.neuclear.receiver.ReceiverServlet;
import javax.servlet.ServletConfig;
import javax.servlet.ServletException;
/*
NeuClear Distributed Transaction Clearing Platform
(C) 2003 Pelle Braendgaard
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
$Id: AssetControllerServlet.java,v 1.1 2003/11/18 23:34:29 pelle Exp $
$Log: AssetControllerServlet.java,v $
Revision 1.1 2003/11/18 23:34:29 pelle
Payment Web Application is getting there.
*/
/**
* User: pelleb
* Date: Nov 18, 2003
* Time: 6:18:18 PM
*/
public class AssetControllerServlet extends ReceiverServlet {
public void init(ServletConfig config) throws ServletException {
super.init(config);
serviceid = config.getInitParameter("serviceid");
datasource = config.getInitParameter("datasource");
try {
asset = (Asset) NSResolver.resolveIdentity(serviceid);
AssetControllerReceiver receiver = new AssetControllerReceiver(
new CurrencyController(
new SQLLedger(
new JNDIConnectionSource(datasource),
serviceid
),
serviceid
),
new TestCaseSigner()
);
setReceiver(receiver);
} catch (Exception e) {
e.printStackTrace();
}
}
private Asset asset;
private String serviceid;
private String datasource;
}
|
|
From: <bug...@ve...> - 2003-11-18 23:07:32
|
Message: A new issue has been created in JIRA. --------------------------------------------------------------------- View the issue: http://devone.veraxpay.com:9090/secure/ViewIssue.jspa?key=PAY-6 Here is an overview of the issue: --------------------------------------------------------------------- Key: PAY-6 Summary: Create Asset Controller Servlet Type: New Feature Status: Open Priority: Major Original Estimate: Unknown Time Spent: Unknown Remaining: Unknown Project: NeuClear Payments Fix Fors: 0.3 Assignee: Pelle Braendgaard Reporter: Pelle Braendgaard Created: Tue, 18 Nov 2003 6:08 PM Updated: Tue, 18 Nov 2003 6:08 PM Description: The AssetControl server is a wrapper around the AssetControlReceiver. This should also allow JSP's etc in the web application a way of receiving information about the Asset. --------------------------------------------------------------------- JIRA INFORMATION: This message is automatically generated by JIRA. If you think it was sent incorrectly contact one of the administrators: http://devone.veraxpay.com:9090/secure/Administrators.jspa If you want more information on JIRA, or have a bug to report see: http://www.atlassian.com/software/jira |
|
From: <pe...@us...> - 2003-11-18 23:03:56
|
Update of /cvsroot/neuclear/neuclear-pay/src/java/org/neuclear/asset/receiver/servlet In directory sc8-pr-cvs1:/tmp/cvs-serv30716/src/java/org/neuclear/asset/receiver/servlet Log Message: Directory /cvsroot/neuclear/neuclear-pay/src/java/org/neuclear/asset/receiver/servlet added to the repository |
|
From: <bug...@ve...> - 2003-11-18 22:34:29
|
Message: A new issue has been created in JIRA. --------------------------------------------------------------------- View the issue: http://devone.veraxpay.com:9090/secure/ViewIssue.jspa?key=NEU-17 Here is an overview of the issue: --------------------------------------------------------------------- Key: NEU-17 Summary: Create Basic XSL Templates Contracts Type: New Feature Status: Open Priority: Major Original Estimate: Unknown Time Spent: Unknown Remaining: Unknown Project: NeuClear Identity Fix Fors: 0.8 Assignee: Pelle Braendgaard Reporter: Pelle Braendgaard Created: Tue, 18 Nov 2003 5:35 PM Updated: Tue, 18 Nov 2003 5:35 PM Description: Create very simple XSL Templates for use by the SigningServlet. This should be expanded later with signed templates. --------------------------------------------------------------------- JIRA INFORMATION: This message is automatically generated by JIRA. If you think it was sent incorrectly contact one of the administrators: http://devone.veraxpay.com:9090/secure/Administrators.jspa If you want more information on JIRA, or have a bug to report see: http://www.atlassian.com/software/jira |
|
From: <pe...@us...> - 2003-11-18 22:28:03
|
Update of /cvsroot/neuclear/neuclear-pay/src/webapp/WEB-INF/Tld In directory sc8-pr-cvs1:/tmp/cvs-serv23280/src/webapp/WEB-INF/Tld Log Message: Directory /cvsroot/neuclear/neuclear-pay/src/webapp/WEB-INF/Tld added to the repository |
|
From: <pe...@us...> - 2003-11-18 22:18:36
|
Update of /cvsroot/neuclear/neuclear-pay/src/webapp/SECURE In directory sc8-pr-cvs1:/tmp/cvs-serv21160/src/webapp/SECURE Log Message: Directory /cvsroot/neuclear/neuclear-pay/src/webapp/SECURE added to the repository |