-/*\r
- * Copyright 2001-2006 Internet2\r
- * \r
- * Licensed under the Apache License, Version 2.0 (the "License");\r
- * you may not use this file except in compliance with the License.\r
- * You may obtain a copy of the License at\r
- *\r
- * http://www.apache.org/licenses/LICENSE-2.0\r
- *\r
- * Unless required by applicable law or agreed to in writing, software\r
- * distributed under the License is distributed on an "AS IS" BASIS,\r
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
- * See the License for the specific language governing permissions and\r
- * limitations under the License.\r
- */\r
-\r
-/**\r
- * SignatureProfileValidator.cpp\r
- * \r
- * SAML-specific signature verification \r
- */\r
- \r
-#include "internal.h"\r
-#include "exceptions.h"\r
-#include "signature/SignatureProfileValidator.h"\r
-\r
-#include <xmltooling/signature/Signature.h>\r
-\r
-#include <xercesc/util/XMLUniDefs.hpp>\r
-#include <xsec/dsig/DSIGReference.hpp>\r
-#include <xsec/dsig/DSIGTransformC14n.hpp>\r
-#include <xsec/dsig/DSIGTransformList.hpp>\r
-\r
-using namespace opensaml;\r
-using namespace xmlsignature;\r
-using namespace xmltooling;\r
-using namespace std;\r
-\r
-void SignatureProfileValidator::validate(const XMLObject* xmlObject) const\r
-{\r
- const Signature* sigObj=dynamic_cast<const Signature*>(xmlObject);\r
- if (!sigObj)\r
- throw ValidationException("Validator only applies to Signature objects.");\r
- DSIGSignature* sig=sigObj->getXMLSignature();\r
- if (!sig)\r
- throw ValidationException("Signature does not exist yet.");\r
-\r
- const SignableObject* signableObj=dynamic_cast<const SignableObject*>(sigObj->getParent());\r
- if (!signableObj)\r
- throw ValidationException("Signature is not a child of a signable SAML object.");\r
- \r
- bool valid=false;\r
- DSIGReferenceList* refs=sig->getReferenceList();\r
- if (refs && refs->getSize()==1) {\r
- DSIGReference* ref=refs->item(0);\r
- if (ref) {\r
- const XMLCh* URI=ref->getURI();\r
- if (URI==NULL || *URI==0 || (*URI==chPound && !XMLString::compareString(URI+1,signableObj->getId()))) {\r
- DSIGTransformList* tlist=ref->getTransforms();\r
- for (unsigned int i=0; tlist && i<tlist->getSize(); i++) {\r
- if (tlist->item(i)->getTransformType()==TRANSFORM_ENVELOPED_SIGNATURE)\r
- valid=true;\r
- else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N &&\r
- tlist->item(i)->getTransformType()!=TRANSFORM_C14N) {\r
- valid=false;\r
- break;\r
- }\r
- }\r
- }\r
- }\r
- }\r
- \r
- if (!valid)\r
- throw ValidationException("Invalid signature profile for SAML object.");\r
-}\r
+/**
+ * Licensed to the University Corporation for Advanced Internet
+ * Development, Inc. (UCAID) under one or more contributor license
+ * agreements. See the NOTICE file distributed with this work for
+ * additional information regarding copyright ownership.
+ *
+ * UCAID licenses this file to you under the Apache License,
+ * Version 2.0 (the "License"); you may not use this file except
+ * in compliance with the License. You may obtain a copy of the
+ * License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
+ * either express or implied. See the License for the specific
+ * language governing permissions and limitations under the License.
+ */
+
+/**
+ * SignatureProfileValidator.cpp
+ *
+ * SAML-specific signature verification.
+ */
+
+#include "internal.h"
+#include "exceptions.h"
+#include "signature/SignableObject.h"
+#include "signature/SignatureProfileValidator.h"
+
+#include <xmltooling/logging.h>
+#include <xmltooling/signature/Signature.h>
+
+#include <xercesc/util/XMLUniDefs.hpp>
+#include <xsec/dsig/DSIGReference.hpp>
+#include <xsec/dsig/DSIGSignature.hpp>
+#include <xsec/dsig/DSIGTransformList.hpp>
+
+using namespace opensaml;
+using namespace xmlsignature;
+using namespace xmltooling::logging;
+using namespace xmltooling;
+using namespace std;
+
+SignatureProfileValidator::SignatureProfileValidator()
+{
+}
+
+SignatureProfileValidator::~SignatureProfileValidator()
+{
+}
+
+void SignatureProfileValidator::validate(const XMLObject* xmlObject) const
+{
+ const Signature* sigObj=dynamic_cast<const Signature*>(xmlObject);
+ if (!sigObj)
+ throw ValidationException("Validator only applies to Signature objects.");
+ validateSignature(*sigObj);
+}
+
+void SignatureProfileValidator::validateSignature(const Signature& sigObj) const
+{
+ DSIGSignature* sig=sigObj.getXMLSignature();
+ if (!sig)
+ throw ValidationException("Signature does not exist yet.");
+
+ const SignableObject* signableObj=dynamic_cast<const SignableObject*>(sigObj.getParent());
+ if (!signableObj)
+ throw ValidationException("Signature is not a child of a signable SAML object.");
+
+ if (sig->getObjectLength() != 0) {
+ Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded <Object> element");
+ throw ValidationException("Invalid signature profile for SAML object.");
+ }
+
+ sig->setIdByAttributeName(false);
+
+ bool valid=false;
+ DSIGReferenceList* refs=sig->getReferenceList();
+ if (refs && refs->getSize()==1) {
+ DSIGReference* ref=refs->item(0);
+ if (ref) {
+ const XMLCh* URI=ref->getURI();
+ const XMLCh* ID=signableObj->getXMLID();
+ if (URI==nullptr || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) {
+ DSIGTransformList* tlist=ref->getTransforms();
+ if (tlist->getSize() <= 2) {
+ for (unsigned int i=0; tlist && i<tlist->getSize(); i++) {
+ if (tlist->item(i)->getTransformType()==TRANSFORM_ENVELOPED_SIGNATURE)
+ valid=true;
+ else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N &&
+ tlist->item(i)->getTransformType()!=TRANSFORM_C14N) {
+ valid=false;
+ Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform");
+ break;
+ }
+ }
+ }
+
+ if (valid && URI && *URI) {
+ valid = false;
+ if (sigObj.getDOM() && signableObj->getDOM()) {
+ DOMElement* signedNode = sigObj.getDOM()->getOwnerDocument()->getElementById(ID);
+ if (signedNode && signedNode->isSameNode(signableObj->getDOM())) {
+ valid = true;
+ }
+ else {
+ Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node");
+ }
+ }
+ }
+ }
+ else {
+ Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID");
+ }
+ }
+ }
+ else {
+ Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references");
+ }
+
+ if (!valid)
+ throw ValidationException("Invalid signature profile for SAML object.");
+}