All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.xml.security.signature.Manifest Maven / Gradle / Ivy

The newest version!
/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements. See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership. The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */
package org.apache.xml.security.signature;

import java.io.IOException;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import java.util.Set;

import javax.xml.parsers.ParserConfigurationException;

import org.apache.xml.security.c14n.CanonicalizationException;
import org.apache.xml.security.c14n.InvalidCanonicalizerException;
import org.apache.xml.security.exceptions.XMLSecurityException;
import org.apache.xml.security.transforms.Transforms;
import org.apache.xml.security.utils.Constants;
import org.apache.xml.security.utils.I18n;
import org.apache.xml.security.utils.SignatureElementProxy;
import org.apache.xml.security.utils.XMLUtils;
import org.apache.xml.security.utils.resolver.ResourceResolver;
import org.apache.xml.security.utils.resolver.ResourceResolverSpi;
import org.w3c.dom.Attr;
import org.w3c.dom.DOMException;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.w3c.dom.Node;
import org.xml.sax.SAXException;

/**
 * Handles <ds:Manifest> elements.
 * 

This element holds the Reference elements

*/ public class Manifest extends SignatureElementProxy { /** * The maximum number of references per Manifest, if secure validation is enabled. */ public static final int MAXIMUM_REFERENCE_COUNT = 30; /** {@link org.apache.commons.logging} logging facility */ private static org.apache.commons.logging.Log log = org.apache.commons.logging.LogFactory.getLog(Manifest.class); /** Field references */ private List references; private Element[] referencesEl; /** Field verificationResults[] */ private boolean verificationResults[] = null; /** Field resolverProperties */ private Map resolverProperties = null; /** Field perManifestResolvers */ private List perManifestResolvers = null; private boolean secureValidation = true; /** * Constructs {@link Manifest} * * @param doc the {@link Document} in which XMLsignature is placed */ public Manifest(Document doc) { super(doc); XMLUtils.addReturnToElement(this.constructionElement); this.references = new ArrayList(); } /** * Constructor Manifest * * @param element * @param baseURI * @throws XMLSecurityException */ public Manifest(Element element, String baseURI) throws XMLSecurityException { this(element, baseURI, false); } /** * Constructor Manifest * * @param element * @param baseURI * @param secureValidation * @throws XMLSecurityException */ public Manifest( Element element, String baseURI, boolean secureValidation ) throws XMLSecurityException { super(element, baseURI); Attr attr = element.getAttributeNodeNS(null, "Id"); if (attr != null) { element.setIdAttributeNode(attr, true); } this.secureValidation = secureValidation; // check out Reference children this.referencesEl = XMLUtils.selectDsNodes( this.constructionElement.getFirstChild(), Constants._TAG_REFERENCE ); int le = this.referencesEl.length; if (le == 0) { // At least one Reference must be present. Bad. Object exArgs[] = { Constants._TAG_REFERENCE, Constants._TAG_MANIFEST }; throw new DOMException(DOMException.WRONG_DOCUMENT_ERR, I18n.translate("xml.WrongContent", exArgs)); } if (secureValidation && le > MAXIMUM_REFERENCE_COUNT) { Object exArgs[] = { le, MAXIMUM_REFERENCE_COUNT }; throw new XMLSecurityException("signature.tooManyReferences", exArgs); } // create List this.references = new ArrayList(le); for (int i = 0; i < le; i++) { Element refElem = referencesEl[i]; Attr refAttr = refElem.getAttributeNodeNS(null, "Id"); if (refAttr != null) { refElem.setIdAttributeNode(refAttr, true); } this.references.add(null); } } /** * This addDocument method is used to add a new resource to the * signed info. A {@link org.apache.xml.security.signature.Reference} is built * from the supplied values. * * @param baseURI the URI of the resource where the XML instance was stored * @param referenceURI URI attribute in Reference for specifying * where data is * @param transforms org.apache.xml.security.signature.Transforms object with an ordered * list of transformations to be performed. * @param digestURI The digest algorithm URI to be used. * @param referenceId * @param referenceType * @throws XMLSignatureException */ public void addDocument( String baseURI, String referenceURI, Transforms transforms, String digestURI, String referenceId, String referenceType ) throws XMLSignatureException { // the this.doc is handed implicitly by the this.getOwnerDocument() Reference ref = new Reference(this.doc, baseURI, referenceURI, this, transforms, digestURI); if (referenceId != null) { ref.setId(referenceId); } if (referenceType != null) { ref.setType(referenceType); } // add Reference object to our cache vector this.references.add(ref); // add the Element of the Reference object to the Manifest/SignedInfo this.constructionElement.appendChild(ref.getElement()); XMLUtils.addReturnToElement(this.constructionElement); } /** * The calculation of the DigestValues in the References must be after the * References are already added to the document and during the signing * process. This ensures that all necessary data is in place. * * @throws ReferenceNotInitializedException * @throws XMLSignatureException */ public void generateDigestValues() throws XMLSignatureException, ReferenceNotInitializedException { for (int i = 0; i < this.getLength(); i++) { // update the cached Reference object, the Element content is automatically updated Reference currentRef = this.references.get(i); currentRef.generateDigestValue(); } } /** * Return the nonnegative number of added references. * * @return the number of references */ public int getLength() { return this.references.size(); } /** * Return the ith reference. Valid i * values are 0 to {link@ getSize}-1. * * @param i Index of the requested {@link Reference} * @return the ith reference * @throws XMLSecurityException */ public Reference item(int i) throws XMLSecurityException { if (this.references.get(i) == null) { // not yet constructed, so _we_ have to Reference ref = new Reference(referencesEl[i], this.baseURI, this, secureValidation); this.references.set(i, ref); } return this.references.get(i); } /** * Sets the Id attribute * * @param Id the Id attribute in ds:Manifest */ public void setId(String Id) { if (Id != null) { this.constructionElement.setAttributeNS(null, Constants._ATT_ID, Id); this.constructionElement.setIdAttributeNS(null, Constants._ATT_ID, true); } } /** * Returns the Id attribute * * @return the Id attribute in ds:Manifest */ public String getId() { return this.constructionElement.getAttributeNS(null, Constants._ATT_ID); } /** * Used to do a reference * validation of all enclosed references using the {@link Reference#verify} method. * *

This step loops through all {@link Reference}s and does verify the hash * values. If one or more verifications fail, the method returns * false. If all verifications are successful, * it returns true. The results of the individual reference * validations are available by using the {@link #getVerificationResult(int)} method * * @return true if all References verify, false if one or more do not verify. * @throws MissingResourceFailureException if a {@link Reference} does not verify * (throws a {@link org.apache.xml.security.signature.ReferenceNotInitializedException} * because of an uninitialized {@link XMLSignatureInput} * @see org.apache.xml.security.signature.Reference#verify * @see org.apache.xml.security.signature.SignedInfo#verify() * @see org.apache.xml.security.signature.MissingResourceFailureException * @throws XMLSecurityException */ public boolean verifyReferences() throws MissingResourceFailureException, XMLSecurityException { return this.verifyReferences(false); } /** * Used to do a reference * validation of all enclosed references using the {@link Reference#verify} method. * *

This step loops through all {@link Reference}s and does verify the hash * values. If one or more verifications fail, the method returns * false. If all verifications are successful, * it returns true. The results of the individual reference * validations are available by using the {@link #getVerificationResult(int)} method * * @param followManifests * @return true if all References verify, false if one or more do not verify. * @throws MissingResourceFailureException if a {@link Reference} does not verify * (throws a {@link org.apache.xml.security.signature.ReferenceNotInitializedException} * because of an uninitialized {@link XMLSignatureInput} * @see org.apache.xml.security.signature.Reference#verify * @see org.apache.xml.security.signature.SignedInfo#verify(boolean) * @see org.apache.xml.security.signature.MissingResourceFailureException * @throws XMLSecurityException */ public boolean verifyReferences(boolean followManifests) throws MissingResourceFailureException, XMLSecurityException { if (referencesEl == null) { this.referencesEl = XMLUtils.selectDsNodes( this.constructionElement.getFirstChild(), Constants._TAG_REFERENCE ); } if (log.isDebugEnabled()) { log.debug("verify " + referencesEl.length + " References"); log.debug("I am " + (followManifests ? "" : "not") + " requested to follow nested Manifests"); } if (referencesEl.length == 0) { throw new XMLSecurityException("empty"); } if (secureValidation && referencesEl.length > MAXIMUM_REFERENCE_COUNT) { Object exArgs[] = { referencesEl.length, MAXIMUM_REFERENCE_COUNT }; throw new XMLSecurityException("signature.tooManyReferences", exArgs); } this.verificationResults = new boolean[referencesEl.length]; boolean verify = true; for (int i = 0; i < this.referencesEl.length; i++) { Reference currentRef = new Reference(referencesEl[i], this.baseURI, this, secureValidation); this.references.set(i, currentRef); // if only one item does not verify, the whole verification fails try { boolean currentRefVerified = currentRef.verify(); this.setVerificationResult(i, currentRefVerified); if (!currentRefVerified) { verify = false; } if (log.isDebugEnabled()) { log.debug("The Reference has Type " + currentRef.getType()); } // was verification successful till now and do we want to verify the Manifest? if (verify && followManifests && currentRef.typeIsReferenceToManifest()) { if (log.isDebugEnabled()) { log.debug("We have to follow a nested Manifest"); } try { XMLSignatureInput signedManifestNodes = currentRef.dereferenceURIandPerformTransforms(null); Set nl = signedManifestNodes.getNodeSet(); Manifest referencedManifest = null; Iterator nlIterator = nl.iterator(); findManifest: while (nlIterator.hasNext()) { Node n = nlIterator.next(); if ((n.getNodeType() == Node.ELEMENT_NODE) && ((Element) n).getNamespaceURI().equals(Constants.SignatureSpecNS) && ((Element) n).getLocalName().equals(Constants._TAG_MANIFEST) ) { try { referencedManifest = new Manifest( (Element)n, signedManifestNodes.getSourceURI(), secureValidation ); break findManifest; } catch (XMLSecurityException ex) { if (log.isDebugEnabled()) { log.debug(ex); } // Hm, seems not to be a ds:Manifest } } } if (referencedManifest == null) { // The Reference stated that it points to a ds:Manifest // but we did not find a ds:Manifest in the signed area throw new MissingResourceFailureException("empty", currentRef); } referencedManifest.perManifestResolvers = this.perManifestResolvers; referencedManifest.resolverProperties = this.resolverProperties; boolean referencedManifestValid = referencedManifest.verifyReferences(followManifests); if (!referencedManifestValid) { verify = false; log.warn("The nested Manifest was invalid (bad)"); } else { if (log.isDebugEnabled()) { log.debug("The nested Manifest was valid (good)"); } } } catch (IOException ex) { throw new ReferenceNotInitializedException("empty", ex); } catch (ParserConfigurationException ex) { throw new ReferenceNotInitializedException("empty", ex); } catch (SAXException ex) { throw new ReferenceNotInitializedException("empty", ex); } } } catch (ReferenceNotInitializedException ex) { Object exArgs[] = { currentRef.getURI() }; throw new MissingResourceFailureException( "signature.Verification.Reference.NoInput", exArgs, ex, currentRef ); } } return verify; } /** * Method setVerificationResult * * @param index * @param verify */ private void setVerificationResult(int index, boolean verify) { if (this.verificationResults == null) { this.verificationResults = new boolean[this.getLength()]; } this.verificationResults[index] = verify; } /** * After verifying a {@link Manifest} or a {@link SignedInfo} using the * {@link Manifest#verifyReferences()} or {@link SignedInfo#verify()} methods, * the individual results can be retrieved with this method. * * @param index an index of into a {@link Manifest} or a {@link SignedInfo} * @return the results of reference validation at the specified index * @throws XMLSecurityException */ public boolean getVerificationResult(int index) throws XMLSecurityException { if ((index < 0) || (index > this.getLength() - 1)) { Object exArgs[] = { Integer.toString(index), Integer.toString(this.getLength()) }; Exception e = new IndexOutOfBoundsException( I18n.translate("signature.Verification.IndexOutOfBounds", exArgs) ); throw new XMLSecurityException("generic.EmptyMessage", e); } if (this.verificationResults == null) { try { this.verifyReferences(); } catch (Exception ex) { throw new XMLSecurityException("generic.EmptyMessage", ex); } } return this.verificationResults[index]; } /** * Adds Resource Resolver for retrieving resources at specified URI attribute * in reference element * * @param resolver {@link ResourceResolver} can provide the implemenatin subclass of * {@link ResourceResolverSpi} for retrieving resource. */ public void addResourceResolver(ResourceResolver resolver) { if (resolver == null) { return; } if (perManifestResolvers == null) { perManifestResolvers = new ArrayList(); } this.perManifestResolvers.add(resolver); } /** * Adds Resource Resolver for retrieving resources at specified URI attribute * in reference element * * @param resolverSpi the implementation subclass of {@link ResourceResolverSpi} for * retrieving the resource. */ public void addResourceResolver(ResourceResolverSpi resolverSpi) { if (resolverSpi == null) { return; } if (perManifestResolvers == null) { perManifestResolvers = new ArrayList(); } perManifestResolvers.add(new ResourceResolver(resolverSpi)); } /** * Get the Per-Manifest Resolver List * @return the per-manifest Resolver List */ public List getPerManifestResolvers() { return perManifestResolvers; } /** * Get the resolver property map * @return the resolver property map */ public Map getResolverProperties() { return resolverProperties; } /** * Used to pass parameters like proxy servers etc to the ResourceResolver * implementation. * * @param key the key * @param value the value */ public void setResolverProperty(String key, String value) { if (resolverProperties == null) { resolverProperties = new HashMap(10); } this.resolverProperties.put(key, value); } /** * Returns the value at specified key * * @param key the key * @return the value */ public String getResolverProperty(String key) { return this.resolverProperties.get(key); } /** * Method getSignedContentItem * * @param i * @return The signed content of the i reference. * * @throws XMLSignatureException */ public byte[] getSignedContentItem(int i) throws XMLSignatureException { try { return this.getReferencedContentAfterTransformsItem(i).getBytes(); } catch (IOException ex) { throw new XMLSignatureException("empty", ex); } catch (CanonicalizationException ex) { throw new XMLSignatureException("empty", ex); } catch (InvalidCanonicalizerException ex) { throw new XMLSignatureException("empty", ex); } catch (XMLSecurityException ex) { throw new XMLSignatureException("empty", ex); } } /** * Method getReferencedContentPriorTransformsItem * * @param i * @return The contents before transformation of the reference i. * @throws XMLSecurityException */ public XMLSignatureInput getReferencedContentBeforeTransformsItem(int i) throws XMLSecurityException { return this.item(i).getContentsBeforeTransformation(); } /** * Method getReferencedContentAfterTransformsItem * * @param i * @return The contents after transformation of the reference i. * @throws XMLSecurityException */ public XMLSignatureInput getReferencedContentAfterTransformsItem(int i) throws XMLSecurityException { return this.item(i).getContentsAfterTransformation(); } /** * Method getSignedContentLength * * @return The number of references contained in this reference. */ public int getSignedContentLength() { return this.getLength(); } /** * Method getBaseLocalName * * @inheritDoc */ public String getBaseLocalName() { return Constants._TAG_MANIFEST; } public boolean isSecureValidation() { return secureValidation; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy