/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.cxf.ws.security.wss4j.policyvalidators;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Collection;
import java.util.List;
import org.apache.cxf.message.Message;
import org.apache.cxf.ws.policy.AssertionInfo;
import org.apache.cxf.ws.policy.AssertionInfoMap;
import org.apache.cxf.ws.security.policy.SP12Constants;
import org.apache.cxf.ws.security.policy.model.AsymmetricBinding;
import org.apache.cxf.ws.security.policy.model.Token;
import org.apache.cxf.ws.security.policy.model.X509Token;
import org.apache.ws.security.WSConstants;
import org.apache.ws.security.WSSecurityEngineResult;
/**
* Validate an AsymmetricBinding policy.
*/
public class AsymmetricBindingPolicyValidator extends AbstractBindingPolicyValidator {
private List<WSSecurityEngineResult> signedResults;
private List<WSSecurityEngineResult> encryptedResults;
private Message message;
private boolean hasDerivedKeys;
public AsymmetricBindingPolicyValidator(
Message message,
List<WSSecurityEngineResult> results,
List<WSSecurityEngineResult> signedResults
) {
this.message = message;
this.results = results;
this.signedResults = signedResults;
// Store the encryption results and whether we have any derived key results
encryptedResults = new ArrayList<WSSecurityEngineResult>();
for (WSSecurityEngineResult result : results) {
Integer actInt = (Integer)result.get(WSSecurityEngineResult.TAG_ACTION);
if (actInt.intValue() == WSConstants.DKT) {
hasDerivedKeys = true;
} else if (actInt.intValue() == WSConstants.ENCR) {
encryptedResults.add(result);
}
}
}
public boolean validatePolicy(
AssertionInfoMap aim
) {
Collection<AssertionInfo> ais = aim.get(SP12Constants.ASYMMETRIC_BINDING);
if (ais == null || ais.isEmpty()) {
return true;
}
for (AssertionInfo ai : ais) {
AsymmetricBinding binding = (AsymmetricBinding)ai.getAssertion();
ai.setAsserted(true);
// Check the protection order
if (!checkProtectionOrder(binding, ai)) {
return false;
}
// Check various properties of the binding
if (!checkProperties(binding, ai, aim, signedResults, message)) {
return false;
}
// Check various tokens of the binding
if (!checkTokens(binding, ai, aim)) {
return false;
}
}
return true;
}
/**
* Check various tokens of the binding
*/
private boolean checkTokens(
AsymmetricBinding binding,
AssertionInfo ai,
AssertionInfoMap aim
) {
if (binding.getInitiatorToken() != null) {
Token token = binding.getInitiatorToken().getToken();
if (token instanceof X509Token) {
for (WSSecurityEngineResult result : signedResults) {
X509Certificate cert =
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
if (cert == null) {
String error = "An X.509 certificate was not used for the initiator token";
notAssertPolicy(aim, binding.getInitiatorToken().getName(), error);
ai.setNotAsserted(error);
return false;
}
}
}
assertPolicy(aim, binding.getInitiatorToken());
if (!checkDerivedKeys(
binding.getInitiatorToken(), hasDerivedKeys, signedResults, encryptedResults
)) {
ai.setNotAsserted("Message fails the DerivedKeys requirement");
return false;
}
}
if (binding.getRecipientToken() != null) {
assertPolicy(aim, binding.getRecipientToken());
if (!checkDerivedKeys(
binding.getRecipientToken(), hasDerivedKeys, signedResults, encryptedResults
)) {
ai.setNotAsserted("Message fails the DerivedKeys requirement");
return false;
}
}
return true;
}
}