X-Git-Url: http://www.project-moonshot.org/gitweb/?p=shibboleth%2Fcpp-opensaml.git;a=blobdiff_plain;f=saml%2Fsignature%2FSignatureProfileValidator.cpp;h=76623a1035fea523f6a245a254142da11ab5372c;hp=e6f214cb22cac3c61b744293f543cc11da345c29;hb=de5d798e5a116d657cfeff7d276648ec595af1d2;hpb=5697d9abd4e6d149bbc6153acde26c3f0a5d4859 diff --git a/saml/signature/SignatureProfileValidator.cpp b/saml/signature/SignatureProfileValidator.cpp index e6f214c..76623a1 100644 --- a/saml/signature/SignatureProfileValidator.cpp +++ b/saml/signature/SignatureProfileValidator.cpp @@ -1,17 +1,21 @@ -/* - * Copyright 2001-2009 Internet2 - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at +/** + * Licensed to the University Corporation for Advanced Internet + * Development, Inc. (UCAID) under one or more contributor license + * agreements. See the NOTICE file distributed with this work for + * additional information regarding copyright ownership. + * + * UCAID licenses this file to you under the Apache License, + * Version 2.0 (the "License"); you may not use this file except + * in compliance with the License. You may obtain a copy of the + * License at * - * http://www.apache.org/licenses/LICENSE-2.0 + * http://www.apache.org/licenses/LICENSE-2.0 * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, + * either express or implied. See the License for the specific + * language governing permissions and limitations under the License. */ /** @@ -25,19 +29,28 @@ #include "signature/SignableObject.h" #include "signature/SignatureProfileValidator.h" +#include #include #include #include #include -#include #include using namespace opensaml; using namespace xmlsignature; +using namespace xmltooling::logging; using namespace xmltooling; using namespace std; +SignatureProfileValidator::SignatureProfileValidator() +{ +} + +SignatureProfileValidator::~SignatureProfileValidator() +{ +} + void SignatureProfileValidator::validate(const XMLObject* xmlObject) const { const Signature* sigObj=dynamic_cast(xmlObject); @@ -55,7 +68,14 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const const SignableObject* signableObj=dynamic_cast(sigObj.getParent()); if (!signableObj) throw ValidationException("Signature is not a child of a signable SAML object."); - + + if (sig->getObjectLength() != 0) { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded element"); + throw ValidationException("Invalid signature profile for SAML object."); + } + + sig->setIdByAttributeName(false); + bool valid=false; DSIGReferenceList* refs=sig->getReferenceList(); if (refs && refs->getSize()==1) { @@ -63,7 +83,7 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const if (ref) { const XMLCh* URI=ref->getURI(); const XMLCh* ID=signableObj->getXMLID(); - if (URI==NULL || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) { + if (URI==nullptr || *URI==0 || (*URI==chPound && ID && !XMLString::compareString(URI+1,ID))) { DSIGTransformList* tlist=ref->getTransforms(); if (tlist->getSize() <= 2) { for (unsigned int i=0; tlist && igetSize(); i++) { @@ -72,13 +92,33 @@ void SignatureProfileValidator::validateSignature(const Signature& sigObj) const else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N && tlist->item(i)->getTransformType()!=TRANSFORM_C14N) { valid=false; + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform"); break; } } } + + if (valid && URI && *URI) { + valid = false; + if (sigObj.getDOM() && signableObj->getDOM()) { + DOMElement* signedNode = sigObj.getDOM()->getOwnerDocument()->getElementById(ID); + if (signedNode && signedNode->isSameNode(signableObj->getDOM())) { + valid = true; + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node"); + } + } + } + } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID"); } } } + else { + Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references"); + } if (!valid) throw ValidationException("Invalid signature profile for SAML object.");