[XML Security Suite]

Sample Application - XMLSig


XMLSig is a sample application for illustrating how to process XML Signatures containing Decryption Transform. It enables to generate or validate certain Signature elements in a document.


If you don't have any public/private key pair, you have to prepare it using keytool provided by Java2 with a command like:

  >keytool -genkey -alias key
                   -keyalg RSA
                   -dname "CN=Takeshi Imamura, OU=TRL, O=IBM, C=JP"
                   -keypass keypass
                   -keystore keystore
                   -storepass storepass

Also you have to prepare both keyinfo and template documents. The former is used for providing information on a keystore and keys in it, e.g., key aliases and passwords. keyinfo2.xml is a sample keyinfo document. The latter is used for specifying the structure of a Signature element, which determines the algorithm and key being used and the resulting Signature element. template4.xml is a sample template document.


Before running XMLSig, make sure that all packages (including this) have been installed correctly. Consult the Installation Guide for details.

The usage of XMLSig is as follows:

  >java enc.XMLSig option [arg...]
where option is:


Suppose that you are in data\enc\ of this package. If you want to generate the Signature element in template4.xml with a key in the keystore specified in keyinfo2.xml, type:

  >java enc.XMLSig -g keyinfo2.xml
                           and local-name()='Signature']"
You will see the resulting document in stdout. Note that the Signature element contains Decryption Transform in order to facilitate subsequent encryption of the document. It can be done using DOMCipher or XNICipher.

Then if you want to validate the generated Signature element with the corresponding key in the keystore specified in keyinfo1.xml, type:

  >java enc.XMLSig -v keyinfo1.xml
                           and local-name()='Signature']"
where it is assumed that you stored the signature document in foo.xml. You will see that the Signature element can be validated properly even after subsequent encryption.

Takeshi Imamura
Hiroshi Maruyama