org.apache.ws.security.action.UsernameTokenSignedAction Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of wss4j Show documentation
Show all versions of wss4j Show documentation
The Apache WSS4J project provides a Java implementation of the primary security standards
for Web Services, namely the OASIS Web Services Security (WS-Security) specifications
from the OASIS Web Services Security TC.
The newest version!
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.ws.security.action;
import java.util.ArrayList;
import java.util.List;
import javax.security.auth.callback.CallbackHandler;
import org.apache.ws.security.SOAPConstants;
import org.apache.ws.security.WSConstants;
import org.apache.ws.security.WSEncryptionPart;
import org.apache.ws.security.WSPasswordCallback;
import org.apache.ws.security.WSSecurityException;
import org.apache.ws.security.handler.RequestData;
import org.apache.ws.security.handler.WSHandler;
import org.apache.ws.security.message.WSSecUsernameToken;
import org.apache.ws.security.message.WSSecSignature;
import org.apache.ws.security.util.WSSecurityUtil;
import org.w3c.dom.Document;
/**
* Sign a request using a secret key derived from UsernameToken data.
*
* Enhanced by Alberto Coletti to support digest password type for
* username token signature
*
* @author Werner Dittmann ([email protected])
*/
public class UsernameTokenSignedAction implements Action {
public void execute(WSHandler handler, int actionToDo, Document doc, RequestData reqData)
throws WSSecurityException {
CallbackHandler callbackHandler =
handler.getPasswordCallbackHandler(reqData);
WSPasswordCallback passwordCallback =
handler.getPasswordCB(reqData.getUsername(), actionToDo, callbackHandler, reqData);
WSSecUsernameToken builder = new WSSecUsernameToken(reqData.getWssConfig());
if (reqData.isUseDerivedKey()) {
int iterations = reqData.getDerivedKeyIterations();
boolean useMac = reqData.isUseDerivedKeyForMAC();
builder.addDerivedKey(useMac, null, iterations);
} else {
builder.setPasswordType(reqData.getPwType()); // enhancement by Alberto Coletti
builder.setSecretKeyLength(reqData.getSecretKeyLength());
}
builder.setUserInfo(reqData.getUsername(), passwordCallback.getPassword());
builder.addCreated();
builder.addNonce();
builder.prepare(doc);
// Now prepare to sign.
// First step: Get a WS Signature object and set config parameters
// second step: set user data and algorithm parameters. This
// _must_ be done before we "prepare"
// third step: Call "prepare". This creates the internal WS Signature
// data structures, XML element, fills in the algorithms
// and other data.
// fourth step: Get the references. These references identify the parts
// of the document that will be included into the
// signature. If no references are given sign the message
// body by default.
// fifth step: compute the signature
//
// after "prepare" the Signature XML element is ready and may prepend
// this to the security header.
WSSecSignature sign = new WSSecSignature(reqData.getWssConfig());
sign.setCustomTokenValueType(WSConstants.USERNAMETOKEN_NS + "#UsernameToken");
sign.setCustomTokenId(builder.getId());
sign.setSecretKey(builder.getSecretKey());
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
if (reqData.getSigDigestAlgorithm() != null) {
sign.setDigestAlgo(reqData.getSigDigestAlgorithm());
}
if (reqData.getSigAlgorithm() != null) {
sign.setSignatureAlgorithm(reqData.getSigAlgorithm());
} else {
sign.setSignatureAlgorithm(WSConstants.HMAC_SHA1);
}
sign.prepare(doc, null, reqData.getSecHeader());
// prepend in this order: first the Signature Element and then the
// UsernameToken Element. This way the server gets the UsernameToken
// first, can check it and are prepared to compute the Signature key.
// sign.prependToHeader(reqData.getSecHeader());
// builder.prependToHeader(reqData.getSecHeader());
List parts = null;
if (reqData.getSignatureParts().size() > 0) {
parts = reqData.getSignatureParts();
} else {
SOAPConstants soapConstants = reqData.getSoapConstants();
if (soapConstants == null) {
soapConstants = WSSecurityUtil.getSOAPConstants(doc.getDocumentElement());
}
parts = new ArrayList();
WSEncryptionPart encP =
new WSEncryptionPart(WSConstants.ELEM_BODY, soapConstants.getEnvelopeURI(), "Content");
parts.add(encP);
}
List referenceList =
sign.addReferencesToSign(parts, reqData.getSecHeader());
try {
sign.computeSignature(referenceList);
reqData.getSignatureValues().add(sign.getSignatureValue());
} catch (WSSecurityException e) {
throw new WSSecurityException(
"WSHandler: Error during UsernameTokenSignature", e
);
}
builder.prependToHeader(reqData.getSecHeader());
}
}