Appendix D. Example Programs

This appendix provides a brief description of all the example programs covered in the book. The source code, execution script and readme files corresponding to these examples can be found in the srcjsbook subdirectory of the JSTK (Java Security Tool Kit), the software accompanying the book, installation directory. Examples belonging to a particular chapter are grouped together within ch<nn> subdirectory of this directory, where <nn> denotes the chapter number.

Refer to Appendix C: JSTK Tools for more information on JSTK.

An example has a label of the format: Example ch<nn>-<exdir>, where <nn> stands for the chapter number and <exdir> stands for the example subdirectory. The source files, scripts and other files corresponding to Example ch<nn>-<exdir> can be found in the subdirectory srcjsbookch<nn><exidr> of the JSTK installation. For example, Example ch3-ex1 refers to the first example of the chapter Cryptography with Java and has its sources in the subdirectory srcjsbookch3ex1.

Table D-1. Example Programs
ExampleDescription
ch3-ex1Independent programs to perform cryptographic operations:
  • digest computation

  • public private key-pair generation

  • secret key generation

  • MAC computation

  • listing cryptographic service providers

  • symmetric encryption and decryption

  • asymmetric encryption and decryption.

ch4-ex1Programs to read DER (Distinguished Encoding Rules) encoded X.509 certificate, certificate chain and certificate revocation list and display human readable information.
ch5-ex1, ch5-ex2, ch5-ex3, ch5-ex4, ch5-ex5Example programs to illustrate Java policy files and permissions-based on code origin, code signer and logged-in user.
ch5-ptProgram to measure performance overhead of Java policy-based permission checks.
ch5-bankProgram to simulate banking operations. Illustrates policy-based access to authorize banking operations.
ch7-ex1Program to create and verify XML Signature using VeriSign's TSIK API.
ch7-ex2Program to create and verify XML Signature using Infomosaic's SecureXML API.
ch7-ex3Program to perform XML Encryption and Decryption using symmetric and asymmetric algorithms.
ch8-ex1Example ch5-bank enhanced to use RMI.
ch8-ex2Example ch8-ex1 enhanced to use Java policy-based authorization.
ch9-rmbRudimentary Message Board application. Allows users to view, post and remove messages through a browser. Tested under Apache Tomcat.
ch9-rmb2Example ch8-rmb secured with Web application security. Tested under Apache Tomcat.
ch10-ex1A simple Echo EJB and its client. Tested under BEA WebLogic 7.0 SP2.
ch10-ex2Example ch10-ex1 secured with user login. BEA WebLogic 7.0 SP2.
ch10-ex3Example ch10-ex1 and a gateway EJB to illustrate identity propagation and delegation. Tested under BEA WebLogic 7.0 SP2.
ch11-ex1A simple echo Web service and DII (Dynamic Invocation Interface) client. Tested under Apache Axis.
ch11-ex2Example ch11-ex1 modified to use WS-Security handlers to secure SOAP messages. Tested under Apache Axis.
ch11-wssPrograms to perform WS Security operations on a SOAP message using VeriSign's TSIK and WSSecurity library: signing, encryption, verification, and decryption.
ch11-wss4axisJAX-RPC handlers for Apache Axis, for both client and service, for applying WS-Security. Used by Example ch11-ex2. Tested under Apache Axis.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.208.72