com.sun.xml.wss.impl.callback.PasswordValidationCallback Maven / Gradle / Ivy
Show all versions of webservices-rt Show documentation
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2010 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
/*
* $Id: PasswordValidationCallback.java,v 1.2 2010-10-21 15:37:24 snajper Exp $
*/
package com.sun.xml.wss.impl.callback;
import java.io.UnsupportedEncodingException;
import java.security.MessageDigest;
import javax.security.auth.callback.*;
import com.sun.xml.wss.impl.misc.Base64;
import com.sun.org.apache.xml.internal.security.exceptions.Base64DecodingException;
import com.sun.xml.wss.RealmAuthenticationAdapter;
/**
* This Callback is intended for Username-Password validation.
* A validator that implements the PasswordValidator interface
* should be set on the callback by the callback handler.
*
* Note: A validator for WSS Digested Username-Password is provided
* as part of this callback.
*
* @author XWS-Security Team
*/
public class PasswordValidationCallback extends XWSSCallback implements Callback {
private Request request;
private boolean result = false;
private PasswordValidator validator;
private RealmAuthenticationAdapter authenticator = null;
public PasswordValidationCallback(Request request) {
this.request = request;
}
public boolean getResult() {
try {
if (validator != null)
result = validator.validate(request);
}catch (ClassCastException e){
throw e;
}catch (Exception e) {
return false;
}
return result;
}
public Request getRequest() {
return request;
}
/**
* This method must be invoked by the CallbackHandler while handling
* this callback.
*/
public void setValidator(PasswordValidator validator) {
this.validator = validator;
if (this.validator instanceof ValidatorExtension) {
((ValidatorExtension)this.validator).setRuntimeProperties(this.getRuntimeProperties());
}
}
public PasswordValidator getValidator() {
return this.validator;
}
public void setRealmAuthentcationAdapter(RealmAuthenticationAdapter adapter) {
this.authenticator = adapter;
}
public RealmAuthenticationAdapter getRealmAuthenticationAdapter() {
return this.authenticator;
}
public static interface Request {
}
/**
* Represents a validation request when the password in the username token
* is in plain text.
*/
public static class PlainTextPasswordRequest implements Request {
private String password;
private String userName;
/**
* Constructor.
*
* @param userName java.lang.String
representation of User name.
* @param password java.lang.String
representation of password.
*/
public PlainTextPasswordRequest(String userName, String password) {
this.password = password;
this.userName = userName;
}
/**
* Get the username stored in this Request.
*
* @return java.lang.String
representation of username.
*/
public String getUsername() {
return userName;
}
/**
* Get the password stored in the Request.
*
* @return java.lang.String
representation of password.
*/
public String getPassword() {
return password;
}
}
/**
* Represents a validation request when the password in the username token
* is in digested form.
*/
public static class DigestPasswordRequest implements Request {
private String password;
private String userName;
private String digest;
private String nonce;
private String created;
/**
* Constructor.
*
* @param userName java.lang.String
representing Username.
* @param digest java.lang.String
Base64 encoded form of Digested Password.
* @param nonce java.lang.String
representation of unique Nonce
* used for calculating Digested password.
* @param created java.security.String
representation of created time
* used for password digest calculation.
*
*/
public DigestPasswordRequest(
String userName,
String digest,
String nonce,
String created) {
this.userName = userName;
this.digest = digest;
this.nonce = nonce;
this.created = created;
}
/**
* This method must be invoked by the CallbackHandler while handling
* Callback initialized with DigestPasswordRequest.
*/
public void setPassword(String password) {
this.password = password;
}
public String getPassword() {
return password;
}
public String getUsername() {
return userName;
}
public String getDigest() {
return digest;
}
public String getNonce() {
return nonce;
}
public String getCreated() {
return created;
}
}
public static class DerivedKeyPasswordRequest implements Request {
private String userName;
private String password;
private String created;
public DerivedKeyPasswordRequest(
String userName
//String created
) {
this.userName = userName;
//this.created = created;
}
public void setPassword(String password){
this.password = password;
}
public String getPassword() {
return password;
}
public String getUsername() {
return userName;
}
public void setUsername(String name){
this.userName = name;
}
public String getCreated() {
return created;
}
}
/**
* Interface for validating password.
*/
public static interface PasswordValidator {
/**
* @param request PasswordValidationRequest
* @return true if password validation succeeds else false
*/
public boolean validate(Request request) throws PasswordValidationException;
}
/**
* Implements WSS digest Password Validation.
* The method to compute password digest is described in http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0.pdf
*/
public static class DigestPasswordValidator implements PasswordValidator {
public boolean validate(Request request) throws PasswordValidationException {
DigestPasswordRequest req = (DigestPasswordRequest)request;
String passwd = req.getPassword();
String nonce = req.getNonce();
String created = req.getCreated();
String passwordDigest = req.getDigest();
//String username = req.getUsername();
if (null == passwd)
return false;
byte[] decodedNonce = null;
if (null != nonce) {
try {
decodedNonce = Base64.decode(nonce);
} catch (Base64DecodingException bde) {
throw new PasswordValidationException(bde);
}
}
String utf8String = "";
if (created != null) {
utf8String += created;
}
utf8String += passwd;
byte[] utf8Bytes;
try {
utf8Bytes = utf8String.getBytes("utf-8");
} catch (UnsupportedEncodingException uee) {
throw new PasswordValidationException(uee);
}
byte[] bytesToHash;
if (decodedNonce != null) {
bytesToHash = new byte[utf8Bytes.length + decodedNonce.length];
for (int i = 0; i < decodedNonce.length; i++)
bytesToHash[i] = decodedNonce[i];
for (int i = decodedNonce.length;
i < utf8Bytes.length + decodedNonce.length;
i++)
bytesToHash[i] = utf8Bytes[i - decodedNonce.length];
} else {
bytesToHash = utf8Bytes;
}
byte[] hash;
try {
MessageDigest sha = MessageDigest.getInstance("SHA-1");
hash = sha.digest(bytesToHash);
} catch (Exception e) {
throw new PasswordValidationException(
"Password Digest could not be created" + e);
}
return (passwordDigest.equals(Base64.encode(hash)));
}
}
public abstract static class WsitDigestPasswordValidator extends DigestPasswordValidator {
public abstract void setPassword(Request request);
}
public abstract static class DerivedKeyPasswordValidator implements PasswordValidator {
public abstract void setPassword(Request request);
}
public static class PasswordValidationException extends Exception {
public PasswordValidationException(String message) {
super(message);
}
public PasswordValidationException(String message, Throwable cause) {
super(message, cause);
}
public PasswordValidationException(Throwable cause) {
super(cause);
}
}
}