X-Git-Url: http://www.project-moonshot.org/gitweb/?p=shibboleth%2Fcpp-opensaml.git;a=blobdiff_plain;f=saml%2Fsignature%2FSignatureProfileValidator.cpp;h=76623a1035fea523f6a245a254142da11ab5372c;hp=603d24b4f6b333dd20a7620a9ce933b4a9189e5f;hb=de5d798e5a116d657cfeff7d276648ec595af1d2;hpb=e54deb7f338686e0a62dad2ac79caa9381e46362 diff --git a/saml/signature/SignatureProfileValidator.cpp b/saml/signature/SignatureProfileValidator.cpp index 603d24b..76623a1 100644 --- a/saml/signature/SignatureProfileValidator.cpp +++ b/saml/signature/SignatureProfileValidator.cpp @@ -29,6 +29,7 @@ #include "signature/SignableObject.h" #include "signature/SignatureProfileValidator.h" +#include #include #include @@ -38,6 +39,7 @@ using namespace opensaml; using namespace xmlsignature; +using namespace xmltooling::logging; using namespace xmltooling; using namespace std; @@ -66,7 +68,14 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const const SignableObject* signableObj=dynamic_cast(sigObj.getParent()); if (!signableObj) throw ValidationException("Signature is not a child of a signable SAML object."); - + + if (sig->getObjectLength() != 0) { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded element"); + throw ValidationException("Invalid signature profile for SAML object."); + } + + sig->setIdByAttributeName(false); + bool valid=false; DSIGReferenceList* refs=sig->getReferenceList(); if (refs && refs->getSize()==1) { @@ -83,13 +92,33 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N && tlist->item(i)->getTransformType()!=TRANSFORM_C14N) { valid=false; + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform"); break; } } } + + if (valid && URI && *URI) { + valid = false; + if (sigObj.getDOM() && signableObj->getDOM()) { + DOMElement* signedNode = sigObj.getDOM()->getOwnerDocument()->getElementById(ID); + if (signedNode && signedNode->isSameNode(signableObj->getDOM())) { + valid = true; + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node"); + } + } + } + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID"); } } } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references"); + } if (!valid) throw ValidationException("Invalid signature profile for SAML object.");