com.sun.xml.wss.impl.dsig.SignatureProcessor Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of webservices-rt Show documentation
Show all versions of webservices-rt Show documentation
This module contains the Metro runtime code.
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2010-2013 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
/*
* $Id: SignatureProcessor.java,v 1.2 2010-10-21 15:37:28 snajper Exp $
*/
package com.sun.xml.wss.impl.dsig;
import com.sun.org.apache.xml.internal.security.encryption.EncryptedKey;
import com.sun.org.apache.xml.internal.security.encryption.XMLCipher;
import com.sun.org.apache.xml.internal.security.exceptions.Base64DecodingException;
import com.sun.xml.wss.impl.misc.Base64;
import com.sun.xml.ws.security.IssuedTokenContext;
import com.sun.xml.ws.security.impl.DerivedKeyTokenImpl;
import com.sun.xml.ws.security.DerivedKeyToken;
import com.sun.xml.wss.core.DerivedKeyTokenHeaderBlock;
import com.sun.xml.wss.core.reference.X509ThumbPrintIdentifier;
import com.sun.xml.wss.impl.WssSoapFaultException;
import com.sun.xml.wss.XWSSecurityException;
import com.sun.xml.wss.impl.FilterProcessingContext;
import com.sun.xml.wss.core.reference.X509SubjectKeyIdentifier;
import com.sun.xml.wss.impl.policy.mls.DerivedTokenKeyBinding;
import com.sun.xml.wss.impl.policy.mls.IssuedTokenKeyBinding;
import com.sun.xml.wss.impl.policy.verifier.SignaturePolicyVerifier;
import com.sun.xml.wss.logging.LogDomainConstants;
import com.sun.xml.wss.impl.MessageConstants;
import com.sun.xml.wss.impl.PolicyViolationException;
import com.sun.xml.wss.impl.SecurableSoapMessage;
import com.sun.xml.wss.impl.PolicyTypeUtil;
import com.sun.xml.wss.impl.misc.SecurityUtil;
import com.sun.xml.wss.core.SecurityHeader;
import com.sun.xml.wss.core.SecurityTokenReference;
import com.sun.xml.wss.core.SamlAssertionHeaderBlock;
import com.sun.xml.wss.core.X509SecurityToken;
import com.sun.xml.wss.core.reference.DirectReference;
import com.sun.xml.wss.core.reference.X509IssuerSerial;
import com.sun.xml.wss.core.reference.EncryptedKeySHA1Identifier;
import com.sun.xml.wss.core.KeyInfoHeaderBlock;
import com.sun.xml.wss.impl.policy.mls.MessagePolicy;
import com.sun.xml.wss.impl.policy.mls.SignaturePolicy;
import com.sun.xml.wss.impl.policy.mls.WSSPolicy;
import com.sun.xml.wss.impl.policy.SecurityPolicy;
import com.sun.xml.wss.impl.policy.mls.AuthenticationTokenPolicy;
import com.sun.xml.wss.impl.policy.mls.PrivateKeyBinding;
import com.sun.xml.wss.impl.policy.mls.SignatureTarget;
import com.sun.xml.wss.impl.policy.mls.SymmetricKeyBinding;
import com.sun.xml.wss.impl.keyinfo.KeyIdentifierStrategy;
import com.sun.xml.wss.impl.keyinfo.KeyInfoStrategy;
import com.sun.xml.wss.core.SecurityContextTokenImpl;
import com.sun.xml.ws.security.SecurityContextToken;
import com.sun.xml.wss.impl.policy.mls.SecureConversationTokenKeyBinding;
import com.sun.xml.wss.impl.transform.DOMSTRTransform;
import com.sun.xml.wss.impl.AlgorithmSuite;
import java.io.IOException;
import java.io.InputStream;
import java.security.Key;
import java.security.cert.X509Certificate;
import java.security.spec.AlgorithmParameterSpec;
import java.security.MessageDigest;
import java.util.ArrayList;
import java.util.Collections;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.xml.crypto.Data;
import javax.xml.crypto.KeySelectorException;
import javax.xml.crypto.NodeSetData;
import javax.xml.crypto.OctetStreamData;
import javax.xml.crypto.URIReference;
import javax.xml.crypto.URIReferenceException;
import javax.xml.crypto.dsig.CanonicalizationMethod;
import javax.xml.crypto.dsig.DigestMethod;
import javax.xml.crypto.dsig.Reference;
import javax.xml.crypto.dsig.SignatureMethod;
import javax.xml.crypto.dsig.SignedInfo;
import javax.xml.crypto.dsig.Transform;
import javax.xml.crypto.dsig.TransformService;
import javax.xml.crypto.dsig.spec.ExcC14NParameterSpec;
import javax.xml.crypto.dsig.XMLSignature;
import javax.xml.crypto.dsig.XMLSignatureException;
import javax.xml.crypto.dsig.XMLSignatureFactory;
import javax.xml.crypto.dsig.dom.DOMSignContext;
import javax.xml.crypto.dsig.dom.DOMValidateContext;
import javax.xml.crypto.dsig.spec.TransformParameterSpec;
import javax.xml.crypto.dsig.keyinfo.KeyInfo;
import javax.crypto.spec.SecretKeySpec;
import javax.xml.soap.SOAPElement;
import javax.xml.soap.SOAPMessage;
import javax.xml.namespace.QName;
import org.w3c.dom.Node;
import org.w3c.dom.Element;
import org.w3c.dom.NodeList;
import com.sun.xml.ws.security.trust.GenericToken;
import com.sun.xml.wss.impl.XMLUtil;
import com.sun.xml.wss.logging.impl.dsig.LogStringsMessages;
import java.security.NoSuchAlgorithmException;
import javax.xml.soap.SOAPException;
/*
*
* This class provides support for WSS 1.0 signature generation and verification.
* This class depends on JSR105 Digital signature implementation.
* @author [email protected]
*
*/
public class SignatureProcessor{
private static Logger logger = Logger.getLogger(LogDomainConstants.IMPL_SIGNATURE_DOMAIN,
LogDomainConstants.IMPL_SIGNATURE_DOMAIN_BUNDLE);
/**
*
* @param context FilterProcessingContext
* @throws XWSSecurityException
* @return errorCode
*/
@SuppressWarnings("unchecked")
public static int sign(FilterProcessingContext context) throws XWSSecurityException {
try{
SignaturePolicy signaturePolicy = (SignaturePolicy)context.getSecurityPolicy();
SOAPMessage soapMessage = context.getSOAPMessage();
//Dependant on secure soap meesage.
//discuss and refactor.
SecurableSoapMessage secureMessage = context.getSecurableSoapMessage();
WSSPolicy keyBinding = (WSSPolicy)signaturePolicy.getKeyBinding();
if(logger.isLoggable(Level.FINEST)){
logger.log(Level.FINEST, "KeyBinding is "+keyBinding);
}
Key signingKey = null;
Node nextSibling = null;
//TODO :: Creation of WSSPolicyConsumerImpl every time.
WSSPolicyConsumerImpl dsigHelper = WSSPolicyConsumerImpl.getInstance();
KeyInfo keyInfo = null;
SecurityHeader securityHeader = secureMessage.findOrCreateSecurityHeader();
SignaturePolicy.FeatureBinding featureBinding =
(SignaturePolicy.FeatureBinding)signaturePolicy.getFeatureBinding();
AlgorithmSuite algSuite = context.getAlgorithmSuite();
boolean wss11Receiver = "true".equals(context.getExtraneousProperty("EnableWSS11PolicyReceiver"));
boolean wss11Sender = "true".equals(context.getExtraneousProperty("EnableWSS11PolicySender"));
boolean wss10 = !wss11Sender;
boolean sendEKSHA1 = wss11Receiver && wss11Sender && (getEKSHA1Ref(context) != null);
if (PolicyTypeUtil.usernameTokenPolicy(keyBinding)) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1326_UNSUPPORTED_USERNAMETOKEN_KEYBINDING());
throw new XWSSecurityException("UsernameToken as KeyBinding for SignaturePolicy is Not Yet Supported");
} else if ( PolicyTypeUtil.derivedTokenKeyBinding(keyBinding)) {
DerivedTokenKeyBinding dtk = (DerivedTokenKeyBinding)keyBinding.clone();
WSSPolicy originalKeyBinding = dtk.getOriginalKeyBinding();
String algorithm = null;
if(algSuite != null){
algorithm = algSuite.getEncryptionAlgorithm();
}
String jceAlgo = SecurityUtil.getSecretKeyAlgorithm(algorithm);
//The offset and length to be used for DKT
//TODO: PLUGFEST the length here should be set correctly
long offset = 0; // Default 0
long length = SecurityUtil.getLengthFromAlgorithm(algorithm);
if(length == 32) length = 24;
if (PolicyTypeUtil.x509CertificateBinding(originalKeyBinding)) {
// this is becuase SecurityPolicy Converter never produces this combination
logger.log(Level.SEVERE, LogStringsMessages.WSS_1327_UNSUPPORTED_ASYMMETRICBINDING_DERIVEDKEY_X_509_TOKEN());
throw new XWSSecurityException("Asymmetric Binding with DerivedKeys under X509Token Policy Not Yet Supported");
} else if ( PolicyTypeUtil.symmetricKeyBinding(originalKeyBinding)) {
SymmetricKeyBinding skb = null;
if ( context.getSymmetricKeyBinding() != null) {
skb = context.getSymmetricKeyBinding();
context.setSymmetricKeyBinding(null);
}
//Construct a derivedKeyToken to be used
Key originalKey = null;
if(context.getCurrentSecret() != null){
originalKey = context.getCurrentSecret();
}else{
originalKey = skb.getSecretKey();
context.setCurrentSecret(originalKey);
}
byte[] secret = originalKey.getEncoded();
DerivedKeyToken dkt = new DerivedKeyTokenImpl(offset, length, secret);
//get the signing key for signature from derivedkeyToken
signingKey = dkt.generateSymmetricKey(jceAlgo);
Node[] nxtSiblingContainer = new Node[1];
keyInfo = prepareForSymmetricKeySignature(context, keyBinding, originalKey, signaturePolicy, nxtSiblingContainer, null, dkt);
nextSibling = nxtSiblingContainer[0];
} else if ( PolicyTypeUtil.issuedTokenKeyBinding(originalKeyBinding)) {
byte[] prfKey = context.getTrustContext().getProofKey();
if (prfKey == null) {
//handle Asymmetric Issued Token
X509Certificate cert =
context.getTrustContext().getRequestorCertificate();
if (cert == null){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1328_ILLEGAL_CERTIFICATE_KEY_NULL());
throw new XWSSecurityException(
"Requestor Certificate and Proof Key are both null for Issued Token");
}
signingKey = context.getSecurityEnvironment().
getPrivateKey(context.getExtraneousProperties(), cert);
//Get the IssuedToken and insert it into the message
GenericToken issuedToken =
(GenericToken)context.getTrustContext().getSecurityToken();
Element elem = (Element)issuedToken.getTokenValue();
SOAPElement tokenElem =
XMLUtil.convertToSoapElement(secureMessage.getSOAPPart(), elem);
//FIX for Issue 26: We need an Id to cache and MS is not setting in
//some cases
String tokId = tokenElem.getAttribute("Id");
if ("".equals(tokId) &&
MessageConstants.ENCRYPTED_DATA_LNAME.equals(
tokenElem.getLocalName())) {
tokenElem.setAttribute("Id", secureMessage.generateId());
}
context.getTokenCache().put(keyBinding.getUUID(), tokenElem);
IssuedTokenKeyBinding ikb = (IssuedTokenKeyBinding)originalKeyBinding;
String iTokenType = ikb.getIncludeToken();
boolean includeToken = (ikb.INCLUDE_ALWAYS_TO_RECIPIENT.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS_VER2.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS_TO_RECIPIENT_VER2.equals(iTokenType)
);
Element strElem = null;
if (includeToken) {
strElem =(Element)context.getTrustContext().
getAttachedSecurityTokenReference().getTokenValue();
}else {
strElem = (Element)context.getTrustContext().
getUnAttachedSecurityTokenReference().getTokenValue();
}
//TODO: remove these expensive conversions
Element imported = (Element)
secureMessage.getSOAPPart().importNode(strElem,true);
SecurityTokenReference str = new SecurityTokenReference(
XMLUtil.convertToSoapElement(secureMessage.getSOAPPart(),
(Element)imported.cloneNode(true)), false);
if (tokenElem != null) {
if(includeToken) {
secureMessage.findOrCreateSecurityHeader().
insertHeaderBlockElement(tokenElem);
nextSibling = tokenElem.getNextSibling();
} else {
nextSibling = null;
}
context.setIssuedSAMLToken(tokenElem);
}
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy,str);
SecurityUtil.updateSamlVsKeyCache(str, context, cert.getPublicKey());
} else {
DerivedKeyToken dkt = new DerivedKeyTokenImpl(offset, length, prfKey);
signingKey = dkt.generateSymmetricKey(jceAlgo);
Node[] nxtSiblingContainer = new Node[1];
//NOTE: passing the proofKey here as original key
String secretKeyAlg = "AES";
if (algSuite != null) {
secretKeyAlg = SecurityUtil.getSecretKeyAlgorithm(algSuite.getEncryptionAlgorithm());
}
Key originalKey = new SecretKeySpec(prfKey, secretKeyAlg);
keyInfo = prepareForSymmetricKeySignature(
context, keyBinding, originalKey, signaturePolicy, nxtSiblingContainer, null, dkt);
nextSibling = nxtSiblingContainer[0];
}
} else if (PolicyTypeUtil.secureConversationTokenKeyBinding(originalKeyBinding)) {
DerivedKeyToken dkt = new DerivedKeyTokenImpl(offset, length, context.getSecureConversationContext().getProofKey());
//get the signing key for signature from derivedkeyToken
signingKey = dkt.generateSymmetricKey(jceAlgo);
Node[] nxtSiblingContainer = new Node[1];
keyInfo = prepareForSymmetricKeySignature(context, keyBinding, null, signaturePolicy, nxtSiblingContainer, null, dkt);
nextSibling = nxtSiblingContainer[0];
}
} else if ( PolicyTypeUtil.issuedTokenKeyBinding(keyBinding)) {
Node[] nxtSiblingContainer = new Node[1];
// look for the proof token inside the IssuedToken
byte[] proofKey = context.getTrustContext().getProofKey();
if (proofKey == null) {
//handle Asymmetric Issued Token
X509Certificate cert =
context.getTrustContext().getRequestorCertificate();
if (cert == null){
logger.log(Level.SEVERE,LogStringsMessages.WSS_1328_ILLEGAL_CERTIFICATE_KEY_NULL());
throw new XWSSecurityException(
"Requestor Certificate and Proof Key are both null for Issued Token");
}
signingKey = context.getSecurityEnvironment().
getPrivateKey(context.getExtraneousProperties(), cert);
//Get the IssuedToken and insert it into the message
GenericToken issuedToken =
(GenericToken)context.getTrustContext().getSecurityToken();
Element elem = (Element)issuedToken.getTokenValue();
SOAPElement tokenElem =
XMLUtil.convertToSoapElement(secureMessage.getSOAPPart(), elem);
//FIX for Issue 26: We need an Id to cache and MS is not setting in
//some cases
String tokId = tokenElem.getAttribute("Id");
if ("".equals(tokId) &&
MessageConstants.ENCRYPTED_DATA_LNAME.equals(
tokenElem.getLocalName())) {
tokenElem.setAttribute("Id", secureMessage.generateId());
}
context.getTokenCache().put(keyBinding.getUUID(), tokenElem);
IssuedTokenKeyBinding ikb = (IssuedTokenKeyBinding)keyBinding;
String iTokenType = ikb.getIncludeToken();
boolean includeToken = (ikb.INCLUDE_ALWAYS_TO_RECIPIENT.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS_VER2.equals(iTokenType) ||
ikb.INCLUDE_ALWAYS_TO_RECIPIENT_VER2.equals(iTokenType)
);
Element strElem = null;
if (includeToken) {
strElem =(Element)context.getTrustContext().
getAttachedSecurityTokenReference().getTokenValue();
}else {
strElem = (Element)context.getTrustContext().
getUnAttachedSecurityTokenReference().getTokenValue();
}
//TODO: remove these expensive conversions
Element imported = (Element)
secureMessage.getSOAPPart().importNode(strElem,true);
SecurityTokenReference str = new SecurityTokenReference(
XMLUtil.convertToSoapElement(secureMessage.getSOAPPart(),
(Element)imported.cloneNode(true)), false);
if (tokenElem != null) {
if(includeToken) {
secureMessage.findOrCreateSecurityHeader().
insertHeaderBlockElement(tokenElem);
nextSibling = tokenElem.getNextSibling();
} else {
nextSibling = null;
}
context.setIssuedSAMLToken(tokenElem);
}
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy,str);
SecurityUtil.updateSamlVsKeyCache(str, context, cert.getPublicKey());
} else {
// symmetric issued
String secretKeyAlg = "AES"; // hardcoding to AES for now
if (algSuite != null) {
secretKeyAlg = SecurityUtil.getSecretKeyAlgorithm(algSuite.getEncryptionAlgorithm());
}
//TODO: assuming proofkey is a byte array in case of Trust as well
signingKey = new SecretKeySpec(proofKey, secretKeyAlg);
keyInfo = prepareForSymmetricKeySignature(
context, keyBinding, signingKey, signaturePolicy, nxtSiblingContainer, null, null);
nextSibling = nxtSiblingContainer[0];
}
} else if (PolicyTypeUtil.secureConversationTokenKeyBinding(keyBinding)) {
//Hack to get the nextSibling node from prepareForSymmetricKeySignature
Node[] nxtSiblingContainer = new Node[1];
keyInfo = prepareForSymmetricKeySignature(
context, keyBinding, null, signaturePolicy, nxtSiblingContainer, null, null);
// look for the proof token inside the secureConversationToken
String secretKeyAlg = "AES"; // hardcoding to AES for now
if (algSuite != null) {
secretKeyAlg = SecurityUtil.getSecretKeyAlgorithm(algSuite.getEncryptionAlgorithm());
}
signingKey = new SecretKeySpec(context.getSecureConversationContext().getProofKey(), secretKeyAlg);
nextSibling = nxtSiblingContainer[0];
} else if(PolicyTypeUtil.x509CertificateBinding(keyBinding)) {
AuthenticationTokenPolicy.X509CertificateBinding certInfo = null;
if ( context.getX509CertificateBinding() != null ) {
certInfo = context.getX509CertificateBinding();
context.setX509CertificateBinding(null);
} else {
certInfo = (AuthenticationTokenPolicy.X509CertificateBinding)keyBinding;
}
PrivateKeyBinding privKBinding = (PrivateKeyBinding)certInfo.getKeyBinding();
signingKey = privKBinding.getPrivateKey();
Node[] nxtSiblingContainer = new Node[1];
keyInfo = handleX509Binding(context, signaturePolicy, certInfo, nxtSiblingContainer);
nextSibling = nxtSiblingContainer[0];
} else if (PolicyTypeUtil.samlTokenPolicy(keyBinding)) {
// populate the policy, the handler should also add a privateKey binding for HOK
AuthenticationTokenPolicy.SAMLAssertionBinding samlBinding =
(AuthenticationTokenPolicy.SAMLAssertionBinding)keyBinding;
PrivateKeyBinding privKBinding = (PrivateKeyBinding)samlBinding.getKeyBinding();
if (privKBinding == null) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1329_NULL_PRIVATEKEYBINDING_SAML_POLICY());
throw new XWSSecurityException("PrivateKey binding not set for SAML Policy by CallbackHandler");
}
signingKey = privKBinding.getPrivateKey();
if (signingKey == null) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1330_NULL_PRIVATEKEY_SAML_POLICY());
throw new XWSSecurityException("PrivateKey null inside PrivateKeyBinding set for SAML Policy ");
}
String referenceType = samlBinding.getReferenceType();
if (referenceType.equals(MessageConstants.EMBEDDED_REFERENCE_TYPE)) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1331_UNSUPPORTED_EMBEDDED_REFERENCE_SAML());
throw new XWSSecurityException("Embedded Reference Type for SAML Assertions not supported yet");
}
String assertionId = samlBinding.getAssertionId();
Element _assertion = samlBinding.getAssertion();
Element _authorityBinding = samlBinding.getAuthorityBinding();
if (assertionId == null) {
if (_assertion == null) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1332_NULL_SAML_ASSERTION_SAML_ASSERTION_ID());
throw new XWSSecurityException(
"None of SAML Assertion, SAML Assertion Id information was set into " +
" the Policy by the CallbackHandler");
}
if(_assertion.getAttributeNode("ID") != null){
assertionId = _assertion.getAttribute("ID");
}else{
assertionId = _assertion.getAttribute("AssertionID");
}
}
SecurityTokenReference tokenRef = new SecurityTokenReference(secureMessage.getSOAPPart());
String strId = samlBinding.getSTRID();
if(strId == null){
strId = secureMessage.generateId();
}
tokenRef.setWsuId(strId);
// set wsse11:TokenType to SAML1.1 or SAML2.0
if(_assertion.getAttributeNode("ID") != null){
tokenRef.setTokenType(MessageConstants.WSSE_SAML_v2_0_TOKEN_TYPE);
}else{
tokenRef.setTokenType(MessageConstants.WSSE_SAML_v1_1_TOKEN_TYPE);
}
if (_authorityBinding != null) {
tokenRef.setSamlAuthorityBinding(_authorityBinding,
secureMessage.getSOAPPart());
}
if ((_assertion != null) && (_authorityBinding == null)) {
//insert the SAML Assertion
SamlAssertionHeaderBlock samlHeaderblock =
new SamlAssertionHeaderBlock(_assertion, secureMessage.getSOAPPart());
secureMessage.findOrCreateSecurityHeader().insertHeaderBlock(samlHeaderblock);
// setting ValueType of Keydentifier to SAML1.1 0r SAML2.0
KeyIdentifierStrategy strat = new KeyIdentifierStrategy(assertionId);
strat.insertKey(tokenRef, secureMessage);
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy, tokenRef);
nextSibling = samlHeaderblock.getAsSoapElement().getNextSibling();
} else {
nextSibling = securityHeader.getNextSiblingOfTimestamp();
}
}else if(PolicyTypeUtil.symmetricKeyBinding(keyBinding)){
SymmetricKeyBinding skb = null;
if ( context.getSymmetricKeyBinding() != null) {
skb = context.getSymmetricKeyBinding();
context.setSymmetricKeyBinding(null);
} else {
skb = (SymmetricKeyBinding)keyBinding;
}
// sign method is HMACSHA-1 for symmetric keys
if(!skb.getKeyIdentifier().equals(MessageConstants._EMPTY)){
signingKey = skb.getSecretKey();
String symmetricKeyName = skb.getKeyIdentifier();
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy, symmetricKeyName);
nextSibling = securityHeader.getNextSiblingOfTimestamp();
} else if(sendEKSHA1){
//get the signing key and EKSHA1 reference from the Subject, it was stored from the incoming message
String ekSha1Ref = getEKSHA1Ref(context);
signingKey = skb.getSecretKey();
SecurityTokenReference secTokenRef = new SecurityTokenReference(secureMessage.getSOAPPart());
EncryptedKeySHA1Identifier refElem = new EncryptedKeySHA1Identifier(secureMessage.getSOAPPart());
refElem.setReferenceValue(ekSha1Ref);
secTokenRef.setReference(refElem);
//set the wsse11:TokenType attribute as required by WSS 1.1
//secTokenRef.setTokenType(MessageConstants.EncryptedKey_NS);
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy, secTokenRef);
nextSibling = securityHeader.getNextSiblingOfTimestamp();
//TODO: the below condition is always true
}else if(wss11Sender || wss10){
signingKey = skb.getSecretKey();
AuthenticationTokenPolicy.X509CertificateBinding x509Binding = null;
X509Certificate cert = null;
if(!skb.getCertAlias().equals(MessageConstants._EMPTY)){
x509Binding = new AuthenticationTokenPolicy.X509CertificateBinding();
x509Binding.newPrivateKeyBinding();
x509Binding.setCertificateIdentifier(skb.getCertAlias());
cert = context.getSecurityEnvironment().getCertificate(context.getExtraneousProperties(), x509Binding.getCertificateIdentifier(), false);
x509Binding.setX509Certificate(cert);
x509Binding.setReferenceType("Direct");
}else if ( context.getX509CertificateBinding() != null ) {
x509Binding = context.getX509CertificateBinding();
context.setX509CertificateBinding(null);
cert = x509Binding.getX509Certificate();
}
HashMap tokenCache = context.getTokenCache();
HashMap insertedX509Cache = context.getInsertedX509Cache();
String x509id = x509Binding.getUUID();
if(x509id == null || x509id.equals("")){
x509id = secureMessage.generateId();
}
SecurityUtil.checkIncludeTokenPolicy(context, x509Binding, x509id);
String keyEncAlgo = XMLCipher.RSA_v1dot5; //<--Harcoding of Algo
String tmp = null;
if(algSuite != null){
tmp = algSuite.getAsymmetricKeyAlgorithm();
}
if(tmp != null && !"".equals(tmp)){
keyEncAlgo = tmp;
}
String referenceType = x509Binding.getReferenceType();
if(referenceType.equals("Identifier") && x509Binding.getValueType().equals(MessageConstants.X509v1_NS)){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1333_UNSUPPORTED_KEYIDENTIFER_X_509_V_1());
throw new XWSSecurityException("Key Identifier strategy in X509v1 is not supported");
}
KeyInfoStrategy strategy = KeyInfoStrategy.getInstance(referenceType);
KeyInfoHeaderBlock keyInfoBlock = null;
secureMessage = context.getSecurableSoapMessage();
dsigHelper = WSSPolicyConsumerImpl.getInstance();
//Check to see if same x509 token used for Signature and Encryption
X509SecurityToken token = null;
cert = x509Binding.getX509Certificate();
String x509TokenId = x509Binding.getUUID();
//String x509TokenId = x509Binding.getPolicyToken().getTokenId();
boolean tokenInserted = false;
//insert x509 token in tokencache always irrespective of reference type
if(x509TokenId == null || x509TokenId.equals("")){
x509TokenId = secureMessage.generateId();
}
token = (X509SecurityToken)tokenCache.get(x509TokenId);
//reference type adjustment in checkIncludePolicy might
// have inserted x509
X509SecurityToken insertedx509 =
(X509SecurityToken)context.getInsertedX509Cache().get(x509TokenId);
if (token == null) {
String valueType = x509Binding.getValueType();
if(valueType==null||valueType.equals("")){
//default valueType for X509 as v3
valueType = MessageConstants.X509v3_NS;
}
token = new X509SecurityToken(secureMessage.getSOAPPart(), cert, x509TokenId, valueType);
tokenCache.put(x509TokenId, token);
} else{
tokenInserted = true;
}
String id = null;
HashMap ekCache = context.getEncryptedKeyCache();
if(!tokenInserted){
context.setCurrentSecret(signingKey);
//Store SymmetricKey generated in ProcessingContext
context.setExtraneousProperty("SecretKey", signingKey);
keyInfoBlock = new KeyInfoHeaderBlock(secureMessage.getSOAPPart());
strategy.setCertificate(cert);
strategy.insertKey(keyInfoBlock, secureMessage, x509TokenId);
com.sun.org.apache.xml.internal.security.keys.KeyInfo apacheKeyInfo = keyInfoBlock.getKeyInfo();
//create an encrypted Key
EncryptedKey encryptedKey = null;
XMLCipher keyEncryptor = null;
try{
keyEncryptor = XMLCipher.getInstance(keyEncAlgo);
keyEncryptor.init(XMLCipher.WRAP_MODE, cert.getPublicKey());
if (keyEncryptor != null) {
encryptedKey = keyEncryptor.encryptKey(secureMessage.getSOAPPart(), signingKey);
}
}catch(Exception e){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1334_ERROR_CREATING_ENCRYPTEDKEY());
throw new XWSSecurityException(e);
}
id = secureMessage.generateId();
encryptedKey.setId(id);
ekCache.put(x509TokenId, id);
// set its KeyInfo
encryptedKey.setKeyInfo(apacheKeyInfo);
// insert the EK into the SOAPMessage
SOAPElement se = (SOAPElement)keyEncryptor.martial(encryptedKey);
if (insertedx509 == null) {
secureMessage.findOrCreateSecurityHeader().insertHeaderBlockElement(se);
} else {
secureMessage.findOrCreateSecurityHeader().insertBefore(se,insertedx509.getNextSibling());
}
//store EKSHA1 of KeyValue contents in context
Element cipherData = (Element)se.getChildElements(new QName(MessageConstants.XENC_NS, "CipherData", MessageConstants.XENC_PREFIX)).next();
String cipherValue = cipherData.getElementsByTagNameNS(MessageConstants.XENC_NS, "CipherValue").item(0).getTextContent();
byte[] decodedCipher = Base64.decode(cipherValue);
byte[] ekSha1 = MessageDigest.getInstance("SHA-1").digest(decodedCipher);
String encEkSha1 = Base64.encode(ekSha1);
context.setExtraneousProperty("EncryptedKeySHA1", encEkSha1);
nextSibling = se.getNextSibling();
} else{
id = (String)ekCache.get(x509TokenId);
signingKey = context.getCurrentSecret();
nextSibling = secureMessage.getElementById(id).getNextSibling();
}
//insert the token as the first child in SecurityHeader -- if same token was not already
// inserted by Encryption
if (MessageConstants.DIRECT_REFERENCE_TYPE.equals(referenceType) && insertedx509 == null){
secureMessage.findOrCreateSecurityHeader().insertHeaderBlock(token);
insertedX509Cache.put(x509TokenId, token);
}
//STR for the KeyInfo of signature
SecurityTokenReference secTokenRef = new SecurityTokenReference(secureMessage.getSOAPPart());
DirectReference reference = new DirectReference();
String strId = x509Binding.getSTRID();
if(strId == null){
strId = secureMessage.generateId();
}
secTokenRef.setWsuId(strId);
//TODO: PLUGFEST Microsoft setting EK on reference inseatd of STR
//secTokenRef.setTokenType(MessageConstants.EncryptedKey_NS);
//set id of encrypted key
reference.setURI("#"+id);
reference.setValueType(MessageConstants.EncryptedKey_NS);
secTokenRef.setReference(reference);
keyInfo = dsigHelper.constructKeyInfo(signaturePolicy,secTokenRef);
}
}else {
logger.log(Level.SEVERE,LogStringsMessages.WSS_1335_UNSUPPORTED_KEYBINDING_SIGNATUREPOLICY());
throw new XWSSecurityException("Unsupported Key Binding for SignaturePolicy");
}
// Put UsernameToken above signature
NodeList nodeList = securityHeader.getElementsByTagNameNS(MessageConstants.WSSE_NS, MessageConstants.USERNAME_TOKEN_LNAME);
if(nodeList != null && nodeList.getLength() > 0){
nextSibling = nodeList.item(0).getNextSibling();
}
// if currentReflist is non-null it means we are doing E before S
Node refList = context.getCurrentRefList();
if (refList != null) {
nextSibling = refList;
//reset it after using once to null.
context.setCurrentReferenceList(null);
}
if(featureBinding.isEndorsingSignature()){
nextSibling = securityHeader.getLastChild().getNextSibling();
}
SignedInfo signedInfo = WSSPolicyConsumerImpl.getInstance().constructSignedInfo(context);
DOMSignContext signContext = null;
if(nextSibling == null){
signContext = new DOMSignContext(signingKey,securityHeader.getAsSoapElement());//firstChildElement);
}else{
signContext = new DOMSignContext(signingKey,securityHeader.getAsSoapElement(),nextSibling);
}
signContext.setURIDereferencer(DSigResolver.getInstance());
XMLSignature signature = dsigHelper.constructSignature(signedInfo, keyInfo, signaturePolicy.getUUID());
signContext.put(MessageConstants.WSS_PROCESSING_CONTEXT, context);
signContext.putNamespacePrefix(MessageConstants.DSIG_NS, MessageConstants.DSIG_PREFIX);
// XMLUtils.circumventBug2650(context.getSecurableSoapMessage().getSOAPPart());
signature.sign(signContext);
//For SignatureConfirmation
List scList = (ArrayList)context.getExtraneousProperty("SignatureConfirmation");
if(scList != null){
scList.add(Base64.encode(signature.getSignatureValue().getValue()));
}
//End SignatureConfirmation specific code
}catch(XWSSecurityException xe){
logger.log(Level.SEVERE,LogStringsMessages.WSS_1316_SIGN_FAILED(),xe);
throw xe;
}catch(Exception ex){
logger.log(Level.SEVERE,LogStringsMessages.WSS_1316_SIGN_FAILED(),ex);
throw new XWSSecurityException(ex);
}
return 0;
}
/**
*
* @param context FilterProcessingContext
* @throws XWSSecurityException
* @return errorCode.
*/
@SuppressWarnings("unchecked")
public static int verify(FilterProcessingContext context) throws XWSSecurityException {
try{
WSSPolicyConsumerImpl dsigUtil = WSSPolicyConsumerImpl.getInstance();;
SOAPElement signElement = context.getSecurableSoapMessage().findSecurityHeader().getCurrentHeaderElement();
if(signElement == null || signElement.getLocalName()== null || !"Signature".equals(signElement.getLocalName()) ){
//throw new XWSSecurityException("No Signature Element found");
String localName = signElement != null ? signElement.getLocalName() : "";
context.setPVE(new PolicyViolationException(
"Expected Signature Element as per receiver requirements, found "+
localName));
context.isPrimaryPolicyViolation(true);
return 0;
}
DOMValidateContext validationContext = new DOMValidateContext(KeySelectorImpl.getInstance(), signElement);
XMLSignatureFactory signatureFactory = WSSPolicyConsumerImpl.getInstance().getSignatureFactory();
// unmarshal the XMLSignature
XMLSignature signature = signatureFactory.unmarshalXMLSignature(validationContext);
verifySignatureAlgorithm(signature);
//For SignatureConfirmation
List scList = (ArrayList)context.getExtraneousProperty("receivedSignValues");
if(scList != null){
scList.add(Base64.encode(signature.getSignatureValue().getValue()));
}
//End SignatureConfirmation specific code
validationContext.setURIDereferencer(DSigResolver.getInstance());
// Validate the XMLSignature (generated above)
validationContext.put(MessageConstants.WSS_PROCESSING_CONTEXT, context);
SignaturePolicy currentMessagePolicy = null;
if(context.getMode() == FilterProcessingContext.ADHOC ||
context.getMode() == FilterProcessingContext.POSTHOC){
currentMessagePolicy = new SignaturePolicy();
context.setInferredPolicy(currentMessagePolicy);
} else if (context.getMode() == FilterProcessingContext.WSDL_POLICY) {
currentMessagePolicy = new SignaturePolicy();
context.getInferredSecurityPolicy().append(currentMessagePolicy);
}
// XMLUtils.circumventBug2650(context.getSecurableSoapMessage().getSOAPPart());
boolean coreValidity = signature.validate(validationContext);
SecurityPolicy securityPolicy = context.getSecurityPolicy();
boolean isBSP = false;
if(securityPolicy != null) {
if (PolicyTypeUtil.messagePolicy(securityPolicy)) {
isBSP = ((MessagePolicy)securityPolicy).isBSP();
} else {
isBSP = ((WSSPolicy)securityPolicy).isBSP();
}
}
// Check core validation status
if (coreValidity == false) {
if(logger.isLoggable(Level.FINEST)){
logger.log(Level.FINEST,"Signature failed core validation");
boolean sv = signature.getSignatureValue().validate(validationContext);
logger.log(Level.FINEST,"Signature validation status: " + sv);
// check the validation status of each Reference
Iterator i = signature.getSignedInfo().getReferences().iterator();
for (int j=0; i.hasNext(); j++) {
Reference ref = (Reference) i.next();
logger.log(Level.FINEST,"Reference ID "+ref.getId());
logger.log(Level.FINEST,"Reference URI "+ref.getURI());
boolean refValid =
ref.validate(validationContext);
logger.log(Level.FINEST,"Reference["+j+"] validity status: " + refValid);
}
}
logger.log(Level.SEVERE, LogStringsMessages.WSS_1315_SIGNATURE_VERIFICATION_FAILED());
XWSSecurityException xwsse = new XWSSecurityException("Signature verification failed");
throw SecurableSoapMessage.newSOAPFaultException(
MessageConstants.WSSE_FAILED_CHECK,"Signature verification failed ",xwsse);
} else {
if(logger.isLoggable(Level.FINEST)){
logger.log(Level.FINE,"Signature Passed Core Validation");
}
SignedInfo signInfo = signature.getSignedInfo();
if (isBSP) {
Iterator i = signInfo.getReferences().iterator();
for (int j=0; i.hasNext(); j++) {
Reference reference = (Reference) i.next();
Iterator t = reference.getTransforms().iterator();
for (int index=0; t.hasNext(); index++) {
Transform transform = (Transform) t.next();
if (Transform.ENVELOPED.equals(transform.getAlgorithm())) {
logger.log(Level.SEVERE, LogStringsMessages.WSS_1336_ILLEGAL_ENVELOPEDSIGNATURE());
throw new XWSSecurityException("Enveloped signatures not permitted by BSP");
}
if (MessageConstants.TRANSFORM_C14N_EXCL_OMIT_COMMENTS.equals(transform.getAlgorithm())) {
//check the inclusiveprefix list is not empty
if (transform.getParameterSpec()!=null) {
ExcC14NParameterSpec spec = (ExcC14NParameterSpec)transform.getParameterSpec();
if (spec.getPrefixList().isEmpty())
logger.log(Level.SEVERE, LogStringsMessages.WSS_1337_INVALID_EMPTYPREFIXLIST());
throw new XWSSecurityException("Prefix List cannot be empty: violation of BSP 5407");
}
}
}
}
}
if(context.getMode() == FilterProcessingContext.POSTHOC){
//TODO: handle SAML KeyBinding here
MessagePolicy policy = (MessagePolicy) context.getSecurityPolicy();
dsigUtil.constructSignaturePolicy(signInfo, policy.isBSP(),currentMessagePolicy);
policy.append(currentMessagePolicy);
}
if(context.getMode() == FilterProcessingContext.ADHOC){
//throws Exception for now , need to throw only
//appropriate errors.
//Next step do it more efficiently.
verifyRequirements(context,signature,validationContext);
SignaturePolicy policy =(SignaturePolicy) context.getSecurityPolicy();
dsigUtil.constructSignaturePolicy(signInfo, policy.isBSP(),currentMessagePolicy);
SignaturePolicyVerifier spv = new SignaturePolicyVerifier(context);
spv.verifyPolicy(policy,currentMessagePolicy);
if(logger.isLoggable(Level.FINEST)){
logger.log(Level.FINE,"Reciever Requirements are met");
}
}
if(context.getMode() == FilterProcessingContext.WSDL_POLICY){
dsigUtil.constructSignaturePolicy(signInfo, currentMessagePolicy, context.getSecurableSoapMessage());
}
}
}catch(XWSSecurityException xwe){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw xwe;
}catch(XMLSignatureException xse){
Throwable t1 = xse.getCause();
if(t1== null){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw new XWSSecurityException(xse);
}
if(t1 instanceof KeySelectorException || t1 instanceof URIReferenceException ){
Throwable t2 = t1.getCause();
if(t2 != null && t2 instanceof WssSoapFaultException){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw (WssSoapFaultException)t2;
}else{
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw new XWSSecurityException((Exception)t1);
}
}
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw new XWSSecurityException(xse);
}catch(Exception ex){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1338_ERROR_VERIFY());
throw new XWSSecurityException(ex);
}finally{
context.setInferredPolicy(null);
}
return 0;
}
/**
*
* @param context
* @param signature
* @param validationContext
* @throws Exception
*/
@SuppressWarnings("unchecked")
public static void verifyRequirements(FilterProcessingContext context ,
XMLSignature signature,DOMValidateContext validationContext )throws Exception{
SignaturePolicy policy =(SignaturePolicy) context.getSecurityPolicy();
SignaturePolicy.FeatureBinding featureBinding = (SignaturePolicy.FeatureBinding)policy.getFeatureBinding();
WSSPolicyConsumerImpl dsigUtil = WSSPolicyConsumerImpl.getInstance();
ArrayList targets = featureBinding.getTargetBindings();
if(targets == null || targets.size() == 0){
return;
}
SignedInfo signedInfo = signature.getSignedInfo();
List signedReferences = signedInfo.getReferences();
Iterator sr = signedReferences.listIterator();
ArrayList signedDataList = new ArrayList();
ArrayList signedReferenceList = new ArrayList();
while(sr.hasNext()){
Reference reference = (Reference)sr.next();
Data tmpObj = getData(reference,validationContext);
signedDataList.add(new DataWrapper(tmpObj));
//TODO:Should use cached data from References of already validated
//messages when sean provides on . For now get the Data again.
signedReferenceList.add(reference);
}
ArrayList optionalReqList = new ArrayList();
ArrayList requiredDataList = new ArrayList();
ArrayList requiredReferenceList = new ArrayList();
ArrayList optionalDataList = new ArrayList();
ArrayList optionalReferenceList = new ArrayList();
//It would have been better If I had optional list
//seperated
Iterator targetItr = targets.iterator();
SecurableSoapMessage secureMessage = context.getSecurableSoapMessage();
while(targetItr.hasNext()){
SignatureTarget signatureTarget = (SignatureTarget) targetItr.next();
boolean requiredTarget = signatureTarget.getEnforce();
List referenceList = null;
try{
if(requiredTarget){
referenceList = dsigUtil.generateReferenceList(Collections.singletonList(signatureTarget),secureMessage,context,true, featureBinding.isEndorsingSignature());
}else{
//dont resolve it now.
optionalReqList.add(signatureTarget);
}
}catch(Exception ex){
logger.log(Level.SEVERE,LogStringsMessages.WSS_1302_REFLIST_ERROR(),ex);
if(requiredTarget){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1339_INVALID_RECEIVER_REQUIREMENTS());
throw new XWSSecurityException("Receiver requirement for SignatureTarget "+
signatureTarget.getValue()+" is not met");
}
//log
}
if(!requiredTarget){
continue;
}
if( referenceList.size() <= 0){
logger.log(Level.SEVERE, LogStringsMessages.WSS_1339_INVALID_RECEIVER_REQUIREMENTS());
throw new XWSSecurityException("Receiver requirement for SignatureTarget "+
signatureTarget.getValue()+" is not met");
}
boolean allRef = false;
//Verify all attachments are signed. || all header elements are signed
/* if(signatureTarget.getValue().startsWith("cid:*") || signatureTarget.getValue().equals(SignatureTarget.ALL_MESSAGE_HEADERS)){
allRef = true;
}*/
for(int i =0; i referenceList)
throws XWSSecurityException {
if (null == referenceList || referenceList.size() < 1) {
String errorStr = LogStringsMessages
.WSS_1315_SIGNATURE_VERIFICATION_FAILED()
+ " at ds:Reference ";
logger.log(Level.SEVERE, errorStr + " Empty or NULL ");
throw new XWSSecurityException(errorStr);
}
for (int i = 0; i < referenceList.size(); i++) {
Reference ref = referenceList.get(i);
verifyTransforms(ref.getTransforms());
verifyDigestMethod(ref.getDigestMethod());
}
}
private static void verifyDigestMethod(DigestMethod digestMethod)
throws XWSSecurityException {
// WSS_1765_INVALID_DEGEST_ALGO
if (null == digestMethod || null == digestMethod.getAlgorithm()) {
String errorStr = LogStringsMessages
.WSS_1301_INVALID_DIGEST_ALGO(null)
+ "at ds:Reference/ds:DigestMethod";
logger.log(Level.SEVERE, errorStr + " is NULL");
throw new XWSSecurityException(errorStr);
}
// todo: verify
}
private static void verifyTransforms(List> trList)
throws XWSSecurityException {
if (null == trList || trList.size() < 1 || trList.size() > 1) {
String errorStr = LogStringsMessages
.WSS_1342_ILLEGAL_UNMATCHED_TRANSFORMS() + " Empty or NULL";
logger.log(Level.SEVERE, errorStr + " at ds:Transforms");
return; // throw new XWSSecurityException(errorStr);
}
// Only support one Tranform here
verifyTransform((Transform) trList.get(0));
}
private static void verifyTransform(Transform tr)
throws XWSSecurityException {
// WSS_1300_DSIG_TRANSFORM_PARAM_ERROR()
if (null == tr) {
String errorStr = LogStringsMessages
.WSS_1342_ILLEGAL_UNMATCHED_TRANSFORMS() + " Empty or NULL";
logger.log(Level.SEVERE, errorStr + "Null ds:Transform found");
throw new XWSSecurityException(errorStr);
}
if (MessageConstants.STR_TRANSFORM_URI.equals(tr.getAlgorithm())) {
verifyStrTransform(tr);
}
// Todo: Add other transform verifications
}
private static void verifyStrTransform(Transform tr)
throws XWSSecurityException {
// WSS_1300_DSIG_TRANSFORM_PARAM_ERROR()
AlgorithmParameterSpec algoParaSpec = tr.getParameterSpec();
if ((null == algoParaSpec)
|| !(algoParaSpec instanceof DOMSTRTransform.STRTransformParameterSpec)) {
String errorStr = LogStringsMessages
.WSS_1300_DSIG_TRANSFORM_PARAM_ERROR()
+ " at ds:Transform/wsse:TransformationParameters";
logger.log(
Level.SEVERE,
errorStr
+ "Error on wsse:TransformationParameters for #STR-Transform");
throw new XWSSecurityException(errorStr);
}
DOMSTRTransform.STRTransformParameterSpec spec = (DOMSTRTransform.STRTransformParameterSpec) algoParaSpec;
verifyCanonicalizationMethod(spec.getCanonicalizationMethod());
}
private static void verifyCanonicalizationMethod(
CanonicalizationMethod canonicalizationMethod)
throws XWSSecurityException {
if (null == canonicalizationMethod) {
String errorStr = LogStringsMessages
.WSS_1368_ILLEGAL_STR_CANONCALIZATION()
+ " at ds:CanonicalizationMethod";
logger.log(Level.SEVERE, errorStr
+ " NULL ds:CanonicalizationMethod");
throw new XWSSecurityException(errorStr);
}
verifyCanonicalizationMethodAlgorithm(canonicalizationMethod
.getAlgorithm());
}
private static String SUPPORTED_CANONICALIZATION_METHOD_ALGORITHM[] = new String[] {
/*
* The Canonical
* XML (without comments) canonicalization method algorithm URI. String
* INCLUSIVE = "http://www.w3.org/TR/2001/REC-xml-c14n-20010315";
*/
CanonicalizationMethod.INCLUSIVE,
/*
* The
* Canonical XML with comments canonicalization method algorithm URI.
* String INCLUSIVE_WITH_COMMENTS =
* "http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments";
*/
CanonicalizationMethod.INCLUSIVE_WITH_COMMENTS,
/*
* The Exclusive Canonical
* XML (without comments) canonicalization method algorithm URI. String
* EXCLUSIVE = "http://www.w3.org/2001/10/xml-exc-c14n#";
*/
CanonicalizationMethod.EXCLUSIVE,
/*
* The
* Exclusive Canonical XML with comments canonicalization method
* algorithm URI. String EXCLUSIVE_WITH_COMMENTS =
* "http://www.w3.org/2001/10/xml-exc-c14n#WithComments";
*/
CanonicalizationMethod.EXCLUSIVE_WITH_COMMENTS };
private static void verifySignatureMethod(SignatureMethod signatureMethod)
throws XWSSecurityException {
if (null == signatureMethod || null == signatureMethod.getAlgorithm()) {
String errorStr = LogStringsMessages
.WSS_1315_SIGNATURE_VERIFICATION_FAILED()
+ "at ds:SignedInfo/ds:SignatureMethod";
logger.log(Level.SEVERE, errorStr + " is NULL");
throw new XWSSecurityException(errorStr);
}
}
}