X-Git-Url: http://www.project-moonshot.org/gitweb/?p=shibboleth%2Fcpp-opensaml.git;a=blobdiff_plain;f=saml%2Fsignature%2FSignatureProfileValidator.cpp;h=76623a1035fea523f6a245a254142da11ab5372c;hp=a3159a689f0159d70d46816c8e8943f62a7afb79;hb=de5d798e5a116d657cfeff7d276648ec595af1d2;hpb=285393d374d488080726f5f00f90aa4590256724 diff --git a/saml/signature/SignatureProfileValidator.cpp b/saml/signature/SignatureProfileValidator.cpp index a3159a6..76623a1 100644 --- a/saml/signature/SignatureProfileValidator.cpp +++ b/saml/signature/SignatureProfileValidator.cpp @@ -1,41 +1,56 @@ -/* - * Copyright 2001-2007 Internet2 - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at +/** + * Licensed to the University Corporation for Advanced Internet + * Development, Inc. (UCAID) under one or more contributor license + * agreements. See the NOTICE file distributed with this work for + * additional information regarding copyright ownership. + * + * UCAID licenses this file to you under the Apache License, + * Version 2.0 (the "License"); you may not use this file except + * in compliance with the License. You may obtain a copy of the + * License at * - * http://www.apache.org/licenses/LICENSE-2.0 + * http://www.apache.org/licenses/LICENSE-2.0 * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, + * either express or implied. See the License for the specific + * language governing permissions and limitations under the License. */ /** * SignatureProfileValidator.cpp * - * SAML-specific signature verification + * SAML-specific signature verification. */ #include "internal.h" #include "exceptions.h" +#include "signature/SignableObject.h" #include "signature/SignatureProfileValidator.h" +#include #include #include #include -#include +#include #include using namespace opensaml; using namespace xmlsignature; +using namespace xmltooling::logging; using namespace xmltooling; using namespace std; +SignatureProfileValidator::SignatureProfileValidator() +{ +} + +SignatureProfileValidator::~SignatureProfileValidator() +{ +} + void SignatureProfileValidator::validate(const XMLObject* xmlObject) const { const Signature* sigObj=dynamic_cast(xmlObject); @@ -53,7 +68,14 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const const SignableObject* signableObj=dynamic_cast(sigObj.getParent()); if (!signableObj) throw ValidationException("Signature is not a child of a signable SAML object."); - + + if (sig->getObjectLength() != 0) { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded element"); + throw ValidationException("Invalid signature profile for SAML object."); + } + + sig->setIdByAttributeName(false); + bool valid=false; DSIGReferenceList* refs=sig->getReferenceList(); if (refs && refs->getSize()==1) { @@ -61,7 +83,7 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const if (ref) { const XMLCh* URI=ref->getURI(); const XMLCh* ID=signableObj->getXMLID(); - if (URI==NULL || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) { + if (URI==nullptr || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) { DSIGTransformList* tlist=ref->getTransforms(); if (tlist->getSize() <= 2) { for (unsigned int i=0; tlist && igetSize(); i++) { @@ -70,13 +92,33 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N && tlist->item(i)->getTransformType()!=TRANSFORM_C14N) { valid=false; + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform"); break; } } } + + if (valid && URI && *URI) { + valid = false; + if (sigObj.getDOM() && signableObj->getDOM()) { + DOMElement* signedNode = sigObj.getDOM()->getOwnerDocument()->getElementById(ID); + if (signedNode && signedNode->isSameNode(signableObj->getDOM())) { + valid = true; + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node"); + } + } + } + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID"); } } } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references"); + } if (!valid) throw ValidationException("Invalid signature profile for SAML object.");