Unified trust engines w/ KeyInfoSource interface, first cut at SOAP transport layer.
[shibboleth/xmltooling.git] / xmltooling / security / impl / ChainingTrustEngine.cpp
1 /*
2  *  Copyright 2001-2005 Internet2
3  * 
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16
17 /**
18  * ChainingTrustEngine.cpp
19  * 
20  * TrustEngine that uses multiple engines in sequence.
21  */
22
23 #include "internal.h"
24 #include "exceptions.h"
25 #include "security/ChainingTrustEngine.h"
26
27 #include <xercesc/util/XMLUniDefs.hpp>
28
29 using namespace xmlsignature;
30 using namespace xmltooling;
31 using namespace std;
32
33 namespace xmltooling {
34     TrustEngine* XMLTOOL_DLLLOCAL ChainingTrustEngineFactory(const DOMElement* const & e)
35     {
36         return new ChainingTrustEngine(e);
37     }
38 };
39
40 static const XMLCh GenericTrustEngine[] =           UNICODE_LITERAL_11(T,r,u,s,t,E,n,g,i,n,e);
41 static const XMLCh type[] =                         UNICODE_LITERAL_4(t,y,p,e);
42
43 ChainingTrustEngine::ChainingTrustEngine(const DOMElement* e) : X509TrustEngine(e) {
44     try {
45         e = e ? xmltooling::XMLHelper::getFirstChildElement(e, GenericTrustEngine) : NULL;
46         while (e) {
47             xmltooling::auto_ptr_char temp(e->getAttributeNS(NULL,type));
48             if (temp.get()) {
49                 auto_ptr<TrustEngine> engine(
50                     XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(temp.get(), e)
51                     );
52                 X509TrustEngine* x509 = dynamic_cast<X509TrustEngine*>(engine.get());
53                 if (x509) {
54                     m_engines.push_back(x509);
55                     engine.release();
56                 }
57                 else {
58                     throw xmltooling::UnknownExtensionException("Embedded trust engine does not support required interface.");
59                 }
60             }
61             e = xmltooling::XMLHelper::getNextSiblingElement(e, GenericTrustEngine);
62         }
63     }
64     catch (xmltooling::XMLToolingException&) {
65         for_each(m_engines.begin(), m_engines.end(), xmltooling::cleanup<X509TrustEngine>());
66         throw;
67     }
68 }
69
70 ChainingTrustEngine::~ChainingTrustEngine() {
71     for_each(m_engines.begin(), m_engines.end(), xmltooling::cleanup<X509TrustEngine>());
72 }
73
74 bool ChainingTrustEngine::validate(
75     Signature& sig,
76     const KeyInfoSource& keyInfoSource,
77     const KeyResolver* keyResolver
78     ) const
79 {
80     for (vector<X509TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
81         if (static_cast<TrustEngine*>(*i)->validate(sig,keyInfoSource,keyResolver))
82             return true;
83     }
84     return false;
85 }
86
87 bool ChainingTrustEngine::validate(
88     const XMLCh* sigAlgorithm,
89     const char* sig,
90     KeyInfo* keyInfo,
91     const char* in,
92     unsigned int in_len,
93     const KeyInfoSource& keyInfoSource,
94     const KeyResolver* keyResolver
95     ) const
96 {
97     for (vector<X509TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
98         if (static_cast<TrustEngine*>(*i)->validate(sigAlgorithm, sig, keyInfo, in, in_len, keyInfoSource, keyResolver))
99             return true;
100     }
101     return false;
102 }
103
104 bool ChainingTrustEngine::validate(
105     XSECCryptoX509* certEE,
106     const vector<XSECCryptoX509*>& certChain,
107     const KeyInfoSource& keyInfoSource,
108     bool checkName,
109     const KeyResolver* keyResolver
110     ) const
111 {
112     for (vector<X509TrustEngine*>::const_iterator i=m_engines.begin(); i!=m_engines.end(); ++i) {
113         if ((*i)->validate(certEE,certChain,keyInfoSource,checkName,keyResolver))
114             return true;
115     }
116     return false;
117 }