7396d83fb8feedc9162b61edbdee60c4137a6e37
[shibboleth/cpp-opensaml.git] / samltest / signature / SAML1RequestTest.h
1 /*\r
2  *  Copyright 2001-2005 Internet2\r
3  * \r
4  * Licensed under the Apache License, Version 2.0 (the "License");\r
5  * you may not use this file except in compliance with the License.\r
6  * You may obtain a copy of the License at\r
7  *\r
8  *     http://www.apache.org/licenses/LICENSE-2.0\r
9  *\r
10  * Unless required by applicable law or agreed to in writing, software\r
11  * distributed under the License is distributed on an "AS IS" BASIS,\r
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
13  * See the License for the specific language governing permissions and\r
14  * limitations under the License.\r
15  */\r
16 \r
17 #include "internal.h"\r
18 #include <saml/saml1/core/Protocols.h>\r
19 #include <saml/signature/SignatureProfileValidator.h>\r
20 #include <xmltooling/signature/SignatureValidator.h>\r
21 \r
22 \r
23 #include <fstream>\r
24 #include <openssl/pem.h>\r
25 #include <xercesc/util/XMLUniDefs.hpp>\r
26 #include <xsec/enc/XSECKeyInfoResolverDefault.hpp>\r
27 #include <xsec/enc/OpenSSL/OpenSSLCryptoX509.hpp>\r
28 #include <xsec/enc/OpenSSL/OpenSSLCryptoKeyRSA.hpp>\r
29 #include <xsec/enc/XSECCryptoException.hpp>\r
30 #include <xsec/framework/XSECException.hpp>\r
31 \r
32 using namespace opensaml::saml1;\r
33 using namespace xmlsignature;\r
34 \r
35 class _addcert : public std::binary_function<X509Data*,XSECCryptoX509*,void> {\r
36 public:\r
37     void operator()(X509Data* bag, XSECCryptoX509* cert) const {\r
38         safeBuffer& buf=cert->getDEREncodingSB();\r
39         X509Certificate* x=X509CertificateBuilder::buildX509Certificate();\r
40         x->setValue(buf.sbStrToXMLCh());\r
41         bag->getX509Certificates().push_back(x);\r
42     }\r
43 };\r
44 \r
45 class SAML1RequestTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
46     XSECCryptoKey* m_key;\r
47     vector<XSECCryptoX509*> m_certs;\r
48 public:\r
49     void setUp() {\r
50         childElementsFile  = data_path + "signature/SAML1Request.xml";\r
51         SAMLObjectBaseTestCase::setUp();\r
52         string keypath=data_path + "key.pem";\r
53         BIO* in=BIO_new(BIO_s_file_internal());\r
54         if (in && BIO_read_filename(in,keypath.c_str())>0) {\r
55             EVP_PKEY* pkey=PEM_read_bio_PrivateKey(in, NULL, NULL, NULL);\r
56             if (pkey) {\r
57                 m_key=new OpenSSLCryptoKeyRSA(pkey);\r
58                 EVP_PKEY_free(pkey);\r
59             }\r
60         }\r
61         if (in) BIO_free(in);\r
62         TS_ASSERT(m_key!=NULL);\r
63 \r
64         string certpath=data_path + "cert.pem";\r
65         in=BIO_new(BIO_s_file_internal());\r
66         if (in && BIO_read_filename(in,certpath.c_str())>0) {\r
67             X509* x=NULL;\r
68             while (x=PEM_read_bio_X509(in,NULL,NULL,NULL)) {\r
69                 m_certs.push_back(new OpenSSLCryptoX509(x));\r
70                 X509_free(x);\r
71             }\r
72         }\r
73         if (in) BIO_free(in);\r
74         TS_ASSERT(m_certs.size()>0);\r
75     }\r
76 \r
77     void tearDown() {\r
78         SAMLObjectBaseTestCase::tearDown();\r
79         delete m_key;\r
80         for_each(m_certs.begin(),m_certs.end(),xmltooling::cleanup<XSECCryptoX509>());\r
81     }\r
82 \r
83     void testSignature() {\r
84         auto_ptr_XMLCh issueInstant("1970-01-02T01:01:02.100Z");\r
85         auto_ptr_XMLCh id("ident");\r
86         auto_ptr_XMLCh method("method");\r
87         auto_ptr_XMLCh nameid("John Doe");\r
88         \r
89         NameIdentifier* n=NameIdentifierBuilder::buildNameIdentifier();\r
90         n->setName(nameid.get());        \r
91         Subject* subject=SubjectBuilder::buildSubject();\r
92         subject->setNameIdentifier(n);\r
93 \r
94         AuthenticationQuery* query=AuthenticationQueryBuilder::buildAuthenticationQuery();\r
95         query->setAuthenticationMethod(method.get());\r
96         query->setSubject(subject);\r
97         \r
98         auto_ptr<Request> request(RequestBuilder::buildRequest());\r
99         request->setRequestID(id.get());\r
100         request->setIssueInstant(issueInstant.get());\r
101         request->setAuthenticationQuery(query);\r
102 \r
103         // Append a Signature.\r
104         Signature* sig=SignatureBuilder::buildSignature();\r
105         request->setSignature(sig);\r
106         sig->setSigningKey(m_key->clone());\r
107 \r
108         // Build KeyInfo.\r
109         KeyInfo* keyInfo=KeyInfoBuilder::buildKeyInfo();\r
110         X509Data* x509Data=X509DataBuilder::buildX509Data();\r
111         keyInfo->getX509Datas().push_back(x509Data);\r
112         for_each(m_certs.begin(),m_certs.end(),bind1st(_addcert(),x509Data));\r
113         sig->setKeyInfo(keyInfo);\r
114 \r
115         // Sign while marshalling.\r
116         vector<Signature*> sigs(1,sig);\r
117         DOMElement* rootElement = NULL;\r
118         try {\r
119             rootElement=request->marshall((DOMDocument*)NULL,&sigs);\r
120         }\r
121         catch (XMLToolingException& e) {\r
122             TS_TRACE(e.what());\r
123             throw;\r
124         }\r
125         \r
126         string buf;\r
127         XMLHelper::serialize(rootElement, buf);\r
128         istringstream in(buf);\r
129         DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
130         const XMLObjectBuilder* b = XMLObjectBuilder::getBuilder(doc->getDocumentElement());\r
131 \r
132         assertEquals(expectedChildElementsDOM, b->buildFromDocument(doc));\r
133         \r
134         try {\r
135             request->getSignature()->registerValidator(new SignatureProfileValidator());\r
136             request->getSignature()->registerValidator(new SignatureValidator(m_key->clone()));\r
137             request->getSignature()->validate(true);\r
138         }\r
139         catch (XMLToolingException& e) {\r
140             TS_TRACE(e.what());\r
141             throw;\r
142         }\r
143     }\r
144 \r
145 };\r