org.apache.wss4j.dom.action.EncryptionDerivedAction Maven / Gradle / Ivy
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.wss4j.dom.action;
import java.util.ArrayList;
import java.util.List;
import javax.security.auth.callback.CallbackHandler;
import org.apache.wss4j.common.EncryptionActionToken;
import org.apache.wss4j.common.SecurityActionToken;
import org.apache.wss4j.common.WSEncryptionPart;
import org.apache.wss4j.common.derivedKey.ConversationConstants;
import org.apache.wss4j.common.ext.WSPasswordCallback;
import org.apache.wss4j.common.ext.WSSecurityException;
import org.apache.wss4j.dom.WSConstants;
import org.apache.wss4j.dom.handler.RequestData;
import org.apache.wss4j.dom.handler.WSHandler;
import org.apache.wss4j.dom.message.WSSecDKEncrypt;
import org.apache.wss4j.dom.message.WSSecEncryptedKey;
import org.apache.wss4j.dom.message.token.SecurityContextToken;
import org.apache.wss4j.dom.util.WSSecurityUtil;
import org.apache.xml.security.stax.impl.util.IDGenerator;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.Node;
public class EncryptionDerivedAction extends AbstractDerivedAction implements Action {
public void execute(WSHandler handler, SecurityActionToken actionToken,
Document doc, RequestData reqData)
throws WSSecurityException {
CallbackHandler callbackHandler = reqData.getCallbackHandler();
if (callbackHandler == null) {
callbackHandler = handler.getPasswordCallbackHandler(reqData);
}
EncryptionActionToken encryptionToken = null;
if (actionToken instanceof EncryptionActionToken) {
encryptionToken = (EncryptionActionToken)actionToken;
}
if (encryptionToken == null) {
encryptionToken = reqData.getEncryptionToken();
}
WSPasswordCallback passwordCallback =
handler.getPasswordCB(encryptionToken.getUser(), WSConstants.DKT_ENCR, callbackHandler, reqData);
WSSecDKEncrypt wsEncrypt = new WSSecDKEncrypt(reqData.getWssConfig());
if (encryptionToken.getKeyIdentifierId() != 0) {
wsEncrypt.setKeyIdentifierType(encryptionToken.getKeyIdentifierId());
}
if (encryptionToken.getSymmetricAlgorithm() != null) {
wsEncrypt.setSymmetricEncAlgorithm(encryptionToken.getSymmetricAlgorithm());
}
wsEncrypt.setUserInfo(encryptionToken.getUser(), passwordCallback.getPassword());
if (reqData.isUse200512Namespace()) {
wsEncrypt.setWscVersion(ConversationConstants.VERSION_05_12);
} else {
wsEncrypt.setWscVersion(ConversationConstants.VERSION_05_02);
}
if (encryptionToken.getDerivedKeyLength() > 0) {
wsEncrypt.setDerivedKeyLength(encryptionToken.getDerivedKeyLength());
}
Element tokenElement =
setupTokenReference(reqData, encryptionToken, wsEncrypt, passwordCallback, doc);
wsEncrypt.setAttachmentCallbackHandler(reqData.getAttachmentCallbackHandler());
try {
List parts = encryptionToken.getParts();
if (parts == null || parts.isEmpty()) {
WSEncryptionPart encP = new WSEncryptionPart(reqData.getSoapConstants()
.getBodyQName().getLocalPart(), reqData.getSoapConstants()
.getEnvelopeURI(), "Content");
parts = new ArrayList();
parts.add(encP);
}
wsEncrypt.setParts(parts);
wsEncrypt.prepare(doc);
Element externRefList = wsEncrypt.encryptForExternalRef(null, parts);
// Put the DerivedKeyToken Element in the right place in the security header
Node nextSibling = null;
if (tokenElement == null
&& "EncryptedKey".equals(encryptionToken.getDerivedKeyTokenReference())) {
nextSibling = findEncryptedKeySibling(reqData);
} else if (tokenElement == null
&& "SecurityContextToken".equals(encryptionToken.getDerivedKeyTokenReference())) {
nextSibling = findSCTSibling(reqData);
}
if (nextSibling == null) {
wsEncrypt.prependDKElementToHeader(reqData.getSecHeader());
} else {
reqData.getSecHeader().getSecurityHeader().insertBefore(
wsEncrypt.getdktElement(), nextSibling);
}
// Add the ReferenceList to the security header
wsEncrypt.addExternalRefElement(externRefList, reqData.getSecHeader());
if (tokenElement != null) {
WSSecurityUtil.prependChildElement(reqData.getSecHeader().getSecurityHeader(), tokenElement);
}
} catch (WSSecurityException e) {
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE,
"empty", e, "Error during Encryption: ");
}
}
private Element setupTokenReference(
RequestData reqData, EncryptionActionToken encryptionToken,
WSSecDKEncrypt wsEncrypt, WSPasswordCallback passwordCallback,
Document doc
) throws WSSecurityException {
String derivedKeyTokenReference = encryptionToken.getDerivedKeyTokenReference();
if ("SecurityContextToken".equals(derivedKeyTokenReference)) {
if (reqData.isUse200512Namespace()) {
wsEncrypt.setCustomValueType(WSConstants.WSC_SCT_05_12);
} else {
wsEncrypt.setCustomValueType(WSConstants.WSC_SCT);
}
// See if a SignatureDerivedAction has already set up a SecurityContextToken
if (reqData.getSignatureToken() != null && reqData.getSignatureToken().getKey() != null
&& reqData.getSignatureToken().getKeyIdentifier() != null) {
byte[] secret = reqData.getSignatureToken().getKey();
String tokenIdentifier = reqData.getSignatureToken().getKeyIdentifier();
wsEncrypt.setExternalKey(secret, tokenIdentifier);
return null;
} else {
String tokenIdentifier = IDGenerator.generateID("uuid:");
wsEncrypt.setExternalKey(passwordCallback.getKey(), tokenIdentifier);
encryptionToken.setKey(passwordCallback.getKey());
encryptionToken.setKeyIdentifier(tokenIdentifier);
int version = ConversationConstants.VERSION_05_12;
if (!reqData.isUse200512Namespace()) {
version = ConversationConstants.VERSION_05_02;
}
SecurityContextToken sct = new SecurityContextToken(version, doc, tokenIdentifier);
return sct.getElement();
}
} else {
wsEncrypt.setCustomValueType(WSConstants.WSS_ENC_KEY_VALUE_TYPE);
// See if a SignatureDerivedAction has already set up an EncryptedKey
if (reqData.getSignatureToken() != null && reqData.getSignatureToken().getKey() != null
&& reqData.getSignatureToken().getKeyIdentifier() != null) {
byte[] ek = reqData.getSignatureToken().getKey();
String tokenIdentifier = reqData.getSignatureToken().getKeyIdentifier();
wsEncrypt.setExternalKey(ek, tokenIdentifier);
return null;
} else {
WSSecEncryptedKey encrKeyBuilder = new WSSecEncryptedKey();
encrKeyBuilder.setUserInfo(encryptionToken.getUser());
if (encryptionToken.getDerivedKeyIdentifier() != 0) {
encrKeyBuilder.setKeyIdentifierType(encryptionToken.getDerivedKeyIdentifier());
} else {
encrKeyBuilder.setKeyIdentifierType(WSConstants.THUMBPRINT_IDENTIFIER);
}
if (encryptionToken.getKeyTransportAlgorithm() != null) {
encrKeyBuilder.setKeyEncAlgo(encryptionToken.getKeyTransportAlgorithm());
}
if (encryptionToken.getDigestAlgorithm() != null) {
encrKeyBuilder.setDigestAlgorithm(encryptionToken.getDigestAlgorithm());
}
if (encryptionToken.getMgfAlgorithm() != null) {
encrKeyBuilder.setMGFAlgorithm(encryptionToken.getMgfAlgorithm());
}
encrKeyBuilder.prepare(doc, encryptionToken.getCrypto());
byte[] ek = encrKeyBuilder.getEphemeralKey();
String tokenIdentifier = encrKeyBuilder.getId();
wsEncrypt.setExternalKey(ek, tokenIdentifier);
encryptionToken.setKey(ek);
encryptionToken.setKeyIdentifier(tokenIdentifier);
return encrKeyBuilder.getEncryptedKeyElement();
}
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy