/*
- * Copyright 2001-2007 Internet2
+ * Copyright 2001-2010 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
/**
* ChainingTrustEngine.cpp
*
- * TrustEngine that uses multiple engines in sequence.
+ * OpenSSLTrustEngine that uses multiple engines in sequence.
*/
#include "internal.h"
#include "exceptions.h"
+#include "logging.h"
#include "security/ChainingTrustEngine.h"
+#include "util/XMLHelper.h"
-#include <log4cpp/Category.hh>
+#include <algorithm>
#include <xercesc/util/XMLUniDefs.hpp>
using namespace xmlsignature;
+using namespace xmltooling::logging;
using namespace xmltooling;
-using namespace log4cpp;
using namespace std;
+using xercesc::DOMElement;
+
namespace xmltooling {
TrustEngine* XMLTOOL_DLLLOCAL ChainingTrustEngineFactory(const DOMElement* const & e)
{
static const XMLCh _TrustEngine[] = UNICODE_LITERAL_11(T,r,u,s,t,E,n,g,i,n,e);
static const XMLCh type[] = UNICODE_LITERAL_4(t,y,p,e);
-ChainingTrustEngine::ChainingTrustEngine(const DOMElement* e) : OpenSSLTrustEngine(e) {
- Category& log=Category::getInstance(XMLTOOLING_LOGCAT".TrustEngine");
- try {
- e = e ? XMLHelper::getFirstChildElement(e, _TrustEngine) : NULL;
- while (e) {
- auto_ptr_char temp(e->getAttributeNS(NULL,type));
+ChainingTrustEngine::ChainingTrustEngine(const DOMElement* e) : TrustEngine(e) {
+ Category& log=Category::getInstance(XMLTOOLING_LOGCAT".TrustEngine."CHAINING_TRUSTENGINE);
+ e = e ? XMLHelper::getFirstChildElement(e, _TrustEngine) : nullptr;
+ while (e) {
+ try {
+ auto_ptr_char temp(e->getAttributeNS(nullptr,type));
if (temp.get() && *temp.get()) {
log.info("building TrustEngine of type %s", temp.get());
- m_engines.push_back(XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(temp.get(), e));
+ TrustEngine* engine = XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(temp.get(), e);
+ m_engines.push_back(engine);
+ SignatureTrustEngine* sig = dynamic_cast<SignatureTrustEngine*>(engine);
+ if (sig)
+ m_sigEngines.push_back(sig);
+ X509TrustEngine* x509 = dynamic_cast<X509TrustEngine*>(engine);
+ if (x509)
+ m_x509Engines.push_back(x509);
+ OpenSSLTrustEngine* ossl = dynamic_cast<OpenSSLTrustEngine*>(engine);
+ if (ossl)
+ m_osslEngines.push_back(ossl);
}
- e = XMLHelper::getNextSiblingElement(e, _TrustEngine);
}
- }
- catch (exception&) {
- for_each(m_engines.begin(), m_engines.end(), xmltooling::cleanup<TrustEngine>());
- throw;
+ catch (exception& ex) {
+ log.error("error building TrustEngine: %s", ex.what());
+ }
+ e = XMLHelper::getNextSiblingElement(e, _TrustEngine);
}
}
for_each(m_engines.begin(), m_engines.end(), xmltooling::cleanup<TrustEngine>());
}
-bool ChainingTrustEngine::validate(
- Signature& sig,
- const KeyInfoSource& keyInfoSource,
- const KeyResolver* keyResolver
- ) const
+void ChainingTrustEngine::addTrustEngine(TrustEngine* newEngine)
+{
+ m_engines.push_back(newEngine);
+}
+
+TrustEngine* ChainingTrustEngine::removeTrustEngine(TrustEngine* oldEngine)
+{
+ for (vector<TrustEngine*>::iterator i=m_engines.begin(); i!=m_engines.end(); i++) {
+ if (oldEngine==(*i)) {
+ m_engines.erase(i);
+ return oldEngine;
+ }
+ }
+ return nullptr;
+}
+
+bool ChainingTrustEngine::validate(Signature& sig, const CredentialResolver& credResolver, CredentialCriteria* criteria) const
{
- for (vector<TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
- if ((*i)->validate(sig,keyInfoSource,keyResolver))
+ for (vector<SignatureTrustEngine*>::const_iterator i=m_sigEngines.begin(); i!=m_sigEngines.end(); ++i) {
+ if ((*i)->validate(sig,credResolver,criteria))
return true;
}
return false;
KeyInfo* keyInfo,
const char* in,
unsigned int in_len,
- const KeyInfoSource& keyInfoSource,
- const KeyResolver* keyResolver
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria
) const
{
- for (vector<TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
- if ((*i)->validate(sigAlgorithm, sig, keyInfo, in, in_len, keyInfoSource, keyResolver))
+ for (vector<SignatureTrustEngine*>::const_iterator i=m_sigEngines.begin(); i!=m_sigEngines.end(); ++i) {
+ if ((*i)->validate(sigAlgorithm, sig, keyInfo, in, in_len, credResolver, criteria))
return true;
}
return false;
bool ChainingTrustEngine::validate(
XSECCryptoX509* certEE,
const vector<XSECCryptoX509*>& certChain,
- const KeyInfoSource& keyInfoSource,
- bool checkName,
- const KeyResolver* keyResolver
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria
) const
{
- X509TrustEngine* down;
- for (vector<TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
- if ((down = dynamic_cast<X509TrustEngine*>(*i)) &&
- down->validate(certEE,certChain,keyInfoSource,checkName,keyResolver))
+ for (vector<X509TrustEngine*>::const_iterator i=m_x509Engines.begin(); i!=m_x509Engines.end(); ++i) {
+ if ((*i)->validate(certEE,certChain,credResolver,criteria))
return true;
}
return false;
bool ChainingTrustEngine::validate(
X509* certEE,
STACK_OF(X509)* certChain,
- const KeyInfoSource& keyInfoSource,
- bool checkName,
- const KeyResolver* keyResolver
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria
) const
{
- OpenSSLTrustEngine* down;
- for (vector<TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
- if ((down = dynamic_cast<OpenSSLTrustEngine*>(*i)) &&
- down->validate(certEE,certChain,keyInfoSource,checkName,keyResolver))
+ for (vector<OpenSSLTrustEngine*>::const_iterator i=m_osslEngines.begin(); i!=m_osslEngines.end(); ++i) {
+ if ((*i)->validate(certEE,certChain,credResolver,criteria))
return true;
}
return false;