https://issues.shibboleth.net/jira/browse/CPPXT-60
[shibboleth/cpp-xmltooling.git] / xmltooling / security / impl / ChainingTrustEngine.cpp
1 /*
2  *  Copyright 2001-2010 Internet2
3  * 
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16
17 /**
18  * ChainingTrustEngine.cpp
19  * 
20  * OpenSSLTrustEngine that uses multiple engines in sequence.
21  */
22
23 #include "internal.h"
24 #include "exceptions.h"
25 #include "logging.h"
26 #include "security/ChainingTrustEngine.h"
27 #include "util/XMLHelper.h"
28
29 #include <algorithm>
30 #include <xercesc/util/XMLUniDefs.hpp>
31
32 using namespace xmlsignature;
33 using namespace xmltooling::logging;
34 using namespace xmltooling;
35 using namespace std;
36
37 using xercesc::DOMElement;
38
39 namespace xmltooling {
40     TrustEngine* XMLTOOL_DLLLOCAL ChainingTrustEngineFactory(const DOMElement* const & e)
41     {
42         return new ChainingTrustEngine(e);
43     }
44 };
45
46 static const XMLCh _TrustEngine[] =                 UNICODE_LITERAL_11(T,r,u,s,t,E,n,g,i,n,e);
47 static const XMLCh type[] =                         UNICODE_LITERAL_4(t,y,p,e);
48
49 ChainingTrustEngine::ChainingTrustEngine(const DOMElement* e) : TrustEngine(e) {
50     Category& log=Category::getInstance(XMLTOOLING_LOGCAT".TrustEngine."CHAINING_TRUSTENGINE);
51     e = e ? XMLHelper::getFirstChildElement(e, _TrustEngine) : nullptr;
52     while (e) {
53         try {
54             string t = XMLHelper::getAttrString(e, nullptr, type);
55             if (!t.empty()) {
56                 log.info("building TrustEngine of type %s", t.c_str());
57                 addTrustEngine(XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(t.c_str(), e));
58             }
59         }
60         catch (exception& ex) {
61             log.error("error building TrustEngine: %s", ex.what());
62         }
63         e = XMLHelper::getNextSiblingElement(e, _TrustEngine);
64     }
65 }
66
67 ChainingTrustEngine::~ChainingTrustEngine() {
68     for_each(m_engines.begin(), m_engines.end(), xmltooling::cleanup<TrustEngine>());
69 }
70
71 void ChainingTrustEngine::addTrustEngine(TrustEngine* newEngine)
72 {
73     m_engines.push_back(newEngine);
74     SignatureTrustEngine* sig = dynamic_cast<SignatureTrustEngine*>(newEngine);
75     if (sig)
76         m_sigEngines.push_back(sig);
77     X509TrustEngine* x509 = dynamic_cast<X509TrustEngine*>(newEngine);
78     if (x509)
79         m_x509Engines.push_back(x509);
80     OpenSSLTrustEngine* ossl = dynamic_cast<OpenSSLTrustEngine*>(newEngine);
81     if (ossl)
82         m_osslEngines.push_back(ossl);
83 }
84
85 TrustEngine* ChainingTrustEngine::removeTrustEngine(TrustEngine* oldEngine)
86 {
87     vector<TrustEngine*>::iterator i = find(m_engines.begin(), m_engines.end(), oldEngine);
88     if (i != m_engines.end()) {
89         m_engines.erase(i);
90
91         SignatureTrustEngine* sig = dynamic_cast<SignatureTrustEngine*>(oldEngine);
92         if (sig) {
93             vector<SignatureTrustEngine*>::iterator s = find(m_sigEngines.begin(), m_sigEngines.end(), sig);
94             if (s != m_sigEngines.end())
95                 m_sigEngines.erase(s);
96         }
97
98         X509TrustEngine* x509 = dynamic_cast<X509TrustEngine*>(oldEngine);
99         if (x509) {
100             vector<X509TrustEngine*>::iterator x = find(m_x509Engines.begin(), m_x509Engines.end(), x509);
101             if (x != m_x509Engines.end())
102                 m_x509Engines.erase(x);
103         }
104
105         OpenSSLTrustEngine* ossl = dynamic_cast<OpenSSLTrustEngine*>(oldEngine);
106         if (ossl) {
107             vector<OpenSSLTrustEngine*>::iterator o = find(m_osslEngines.begin(), m_osslEngines.end(), ossl);
108             if (o != m_osslEngines.end())
109                 m_osslEngines.erase(o);
110         }
111
112         return oldEngine;
113     }
114     return nullptr;
115 }
116
117 bool ChainingTrustEngine::validate(Signature& sig, const CredentialResolver& credResolver, CredentialCriteria* criteria) const
118 {
119     for (vector<SignatureTrustEngine*>::const_iterator i=m_sigEngines.begin(); i!=m_sigEngines.end(); ++i) {
120         if ((*i)->validate(sig,credResolver,criteria))
121             return true;
122     }
123     return false;
124 }
125
126 bool ChainingTrustEngine::validate(
127     const XMLCh* sigAlgorithm,
128     const char* sig,
129     KeyInfo* keyInfo,
130     const char* in,
131     unsigned int in_len,
132     const CredentialResolver& credResolver,
133     CredentialCriteria* criteria
134     ) const
135 {
136     for (vector<SignatureTrustEngine*>::const_iterator i=m_sigEngines.begin(); i!=m_sigEngines.end(); ++i) {
137         if ((*i)->validate(sigAlgorithm, sig, keyInfo, in, in_len, credResolver, criteria))
138             return true;
139     }
140     return false;
141 }
142
143 bool ChainingTrustEngine::validate(
144     XSECCryptoX509* certEE,
145     const vector<XSECCryptoX509*>& certChain,
146     const CredentialResolver& credResolver,
147     CredentialCriteria* criteria
148     ) const
149 {
150     for (vector<X509TrustEngine*>::const_iterator i=m_x509Engines.begin(); i!=m_x509Engines.end(); ++i) {
151         if ((*i)->validate(certEE,certChain,credResolver,criteria))
152             return true;
153     }
154     return false;
155 }
156
157 bool ChainingTrustEngine::validate(
158     X509* certEE,
159     STACK_OF(X509)* certChain,
160     const CredentialResolver& credResolver,
161     CredentialCriteria* criteria
162     ) const
163 {
164     for (vector<OpenSSLTrustEngine*>::const_iterator i=m_osslEngines.begin(); i!=m_osslEngines.end(); ++i) {
165         if ((*i)->validate(certEE,certChain,credResolver,criteria))
166             return true;
167     }
168     return false;
169 }