https://issues.shibboleth.net/jira/browse/CPPOST-67
[shibboleth/cpp-opensaml.git] / saml / signature / SignatureProfileValidator.cpp
index 279f8ed..76623a1 100644 (file)
-/*\r
- *  Copyright 2001-2006 Internet2\r
- * \r
- * Licensed under the Apache License, Version 2.0 (the "License");\r
- * you may not use this file except in compliance with the License.\r
- * You may obtain a copy of the License at\r
- *\r
- *     http://www.apache.org/licenses/LICENSE-2.0\r
- *\r
- * Unless required by applicable law or agreed to in writing, software\r
- * distributed under the License is distributed on an "AS IS" BASIS,\r
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
- * See the License for the specific language governing permissions and\r
- * limitations under the License.\r
- */\r
-\r
-/**\r
- * VerifyingContext.cpp\r
- * \r
- * SAML-specific signature verification \r
- */\r
\r
-#include "internal.h"\r
-#include "exceptions.h"\r
-#include "signature/SignatureProfileValidator.h"\r
-\r
-#include <xmltooling/signature/Signature.h>\r
-\r
-#include <xercesc/util/XMLUniDefs.hpp>\r
-#include <xsec/dsig/DSIGReference.hpp>\r
-#include <xsec/dsig/DSIGTransformC14n.hpp>\r
-#include <xsec/dsig/DSIGTransformList.hpp>\r
-\r
-using namespace opensaml;\r
-using namespace xmlsignature;\r
-using namespace xmltooling;\r
-using namespace std;\r
-\r
-void SignatureProfileValidator::validate(const XMLObject* xmlObject) const\r
-{\r
-    const Signature* sigObj=dynamic_cast<const Signature*>(xmlObject);\r
-    if (!sigObj)\r
-        throw ValidationException("Validator only applies to Signature objects.");\r
-    DSIGSignature* sig=sigObj->getXMLSignature();\r
-    if (!sig)\r
-        throw ValidationException("Signature does not exist yet.");\r
-\r
-    const SignableObject* signableObj=dynamic_cast<const SignableObject*>(sigObj->getParent());\r
-    if (!signableObj)\r
-        throw ValidationException("Signature is not a child of a signable SAML object.");\r
-    \r
-    bool valid=false;\r
-    DSIGReferenceList* refs=sig->getReferenceList();\r
-    if (refs && refs->getSize()==1) {\r
-        DSIGReference* ref=refs->item(0);\r
-        if (ref) {\r
-            const XMLCh* URI=ref->getURI();\r
-            if (URI==NULL || *URI==0 || (*URI==chPound && !XMLString::compareString(URI+1,signableObj->getId()))) {\r
-                DSIGTransformList* tlist=ref->getTransforms();\r
-                for (unsigned int i=0; tlist && i<tlist->getSize(); i++) {\r
-                    if (tlist->item(i)->getTransformType()==TRANSFORM_ENVELOPED_SIGNATURE)\r
-                        valid=true;\r
-                    else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N &&\r
-                             tlist->item(i)->getTransformType()!=TRANSFORM_C14N) {\r
-                        valid=false;\r
-                        break;\r
-                    }\r
-                }\r
-            }\r
-        }\r
-    }\r
-    \r
-    if (!valid)\r
-        throw ValidationException("Invalid signature profile for SAML object.");\r
-}\r
+/**
+ * Licensed to the University Corporation for Advanced Internet
+ * Development, Inc. (UCAID) under one or more contributor license
+ * agreements. See the NOTICE file distributed with this work for
+ * additional information regarding copyright ownership.
+ *
+ * UCAID licenses this file to you under the Apache License,
+ * Version 2.0 (the "License"); you may not use this file except
+ * in compliance with the License. You may obtain a copy of the
+ * License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
+ * either express or implied. See the License for the specific
+ * language governing permissions and limitations under the License.
+ */
+
+/**
+ * SignatureProfileValidator.cpp
+ * 
+ * SAML-specific signature verification.
+ */
+#include "internal.h"
+#include "exceptions.h"
+#include "signature/SignableObject.h"
+#include "signature/SignatureProfileValidator.h"
+
+#include <xmltooling/logging.h>
+#include <xmltooling/signature/Signature.h>
+
+#include <xercesc/util/XMLUniDefs.hpp>
+#include <xsec/dsig/DSIGReference.hpp>
+#include <xsec/dsig/DSIGSignature.hpp>
+#include <xsec/dsig/DSIGTransformList.hpp>
+
+using namespace opensaml;
+using namespace xmlsignature;
+using namespace xmltooling::logging;
+using namespace xmltooling;
+using namespace std;
+
+SignatureProfileValidator::SignatureProfileValidator()
+{
+}
+
+SignatureProfileValidator::~SignatureProfileValidator()
+{
+}
+
+void SignatureProfileValidator::validate(const XMLObject* xmlObject) const
+{
+    const Signature* sigObj=dynamic_cast<const Signature*>(xmlObject);
+    if (!sigObj)
+        throw ValidationException("Validator only applies to Signature objects.");
+    validateSignature(*sigObj);
+}
+
+void SignatureProfileValidator::validateSignature(const Signature& sigObj) const
+{
+    DSIGSignature* sig=sigObj.getXMLSignature();
+    if (!sig)
+        throw ValidationException("Signature does not exist yet.");
+
+    const SignableObject* signableObj=dynamic_cast<const SignableObject*>(sigObj.getParent());
+    if (!signableObj)
+        throw ValidationException("Signature is not a child of a signable SAML object.");
+
+    if (sig->getObjectLength() != 0) {
+        Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded <Object> element");
+        throw ValidationException("Invalid signature profile for SAML object.");
+    }
+
+    sig->setIdByAttributeName(false);
+
+    bool valid=false;
+    DSIGReferenceList* refs=sig->getReferenceList();
+    if (refs && refs->getSize()==1) {
+        DSIGReference* ref=refs->item(0);
+        if (ref) {
+            const XMLCh* URI=ref->getURI();
+            const XMLCh* ID=signableObj->getXMLID();
+            if (URI==nullptr || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) {
+                DSIGTransformList* tlist=ref->getTransforms();
+                if (tlist->getSize() <= 2) { 
+                    for (unsigned int i=0; tlist && i<tlist->getSize(); i++) {
+                        if (tlist->item(i)->getTransformType()==TRANSFORM_ENVELOPED_SIGNATURE)
+                            valid=true;
+                        else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N &&
+                                 tlist->item(i)->getTransformType()!=TRANSFORM_C14N) {
+                            valid=false;
+                            Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform");
+                            break;
+                        }
+                    }
+                }
+
+                if (valid && URI && *URI) {
+                    valid = false;
+                    if (sigObj.getDOM() && signableObj->getDOM()) {
+                        DOMElement* signedNode = sigObj.getDOM()->getOwnerDocument()->getElementById(ID);
+                        if (signedNode && signedNode->isSameNode(signableObj->getDOM())) {
+                            valid = true;
+                        }
+                        else {
+                            Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node");
+                        }
+                    }
+                }
+            }
+            else {
+                Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID");
+            }
+        }
+    }
+    else {
+        Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references");
+    }
+    
+    if (!valid)
+        throw ValidationException("Invalid signature profile for SAML object.");
+}