Solved

How to load the crypto properties file [WSS4J related]

Posted on 2011-03-09
3
1,967 Views
Last Modified: 2012-05-11
Hi, I am writing a WebService client which is signing the SOAP request using WSS4J api. In the WSDD file I have defined SIG_PROP_FILE which points to the crypto.properties which has keystore specific information.
I am loading the WSDD using:
EngineConfiguration config = new FileProvider("<pathname>/client_deploy.wsdd");

Now, when I send a request to the WebService, I got this error message:

Server.userException:java.lang.RuntimeException: CryptoFactory: Cannot load properties:<fname>
I added the properties file in the classpath, but still getting the same error. Any pointers how can I fix this issue?

Thanks a lot.
Leo
0
Comment
Question by:LeoKris
  • 2
3 Comments
 

Author Comment

by:LeoKris
ID: 35080467
Additional comment:

Entry in the WSDD file looks like:

<parameter name="SIG_PROP_FILE" value="<fpath>/crypto.properties"/>  

and, the crypto.properties looks like:

org.apache.ws.security.crypto.provider=org.apache.ws.security.components.crypto.Merlin
org.apache.ws.security.crypto.merlin.keystore.type=jks
org.apache.ws.security.crypto.merlin.keystore.password=keyStorePassword
org.apache.ws.security.crypto.merlin.keystore.alias=myAlias
org.apache.ws.security.crypto.merlin.file=client_keystore.jks
0
 
LVL 92

Accepted Solution

by:
objects earned 500 total points
ID: 35080528
> <parameter name="SIG_PROP_FILE" value="<fpath>/crypto.properties"/>  

that shouldn't be a filepath, try just:


<parameter name="SIG_PROP_FILE" value="crypto.properties"/>  

and put the properties file in the a directory that is in your classpath
0
 

Author Comment

by:LeoKris
ID: 35090820
Hi Objects,
          thanks a lot for your help, it has fixed the issue with a minor change though.
After making the changes, I got this exception:

org.apache.ws.security.WSSecurityException: WSHandler: Signature: no crypto properties

I had to rename the parameter SIG_PROP_FILE to  signaturePropFile and it fixed the issue.

Thanks
Leo
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…
Viewers will learn about arithmetic and Boolean expressions in Java and the logical operators used to create Boolean expressions. We will cover the symbols used for arithmetic expressions and define each logical operator and how to use them in Boole…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now