Modified: webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html?rev=1921891&r1=1921890&r2=1921891&view=diff ============================================================================== --- webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html (original) +++ webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html Thu Nov 14 16:06:47 2024 @@ -29,272 +29,345 @@ <a class="jxr_linenumber" name="L21" href="#L21">21</a> <a class="jxr_linenumber" name="L22" href="#L22">22</a> <strong class="jxr_keyword">import</strong> java.security.PublicKey; <a class="jxr_linenumber" name="L23" href="#L23">23</a> <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate; -<a class="jxr_linenumber" name="L24" href="#L24">24</a> <strong class="jxr_keyword">import</strong> java.security.interfaces.DSAPublicKey; -<a class="jxr_linenumber" name="L25" href="#L25">25</a> <strong class="jxr_keyword">import</strong> java.security.interfaces.ECPublicKey; -<a class="jxr_linenumber" name="L26" href="#L26">26</a> <strong class="jxr_keyword">import</strong> java.security.interfaces.RSAPublicKey; -<a class="jxr_linenumber" name="L27" href="#L27">27</a> <strong class="jxr_keyword">import</strong> java.util.Set; -<a class="jxr_linenumber" name="L28" href="#L28">28</a> -<a class="jxr_linenumber" name="L29" href="#L29">29</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.Reference; -<a class="jxr_linenumber" name="L30" href="#L30">30</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.Transform; -<a class="jxr_linenumber" name="L31" href="#L31">31</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.XMLSignature; -<a class="jxr_linenumber" name="L32" href="#L32">32</a> -<a class="jxr_linenumber" name="L33" href="#L33">33</a> <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.ext.WSSecurityException; -<a class="jxr_linenumber" name="L34" href="#L34">34</a> -<a class="jxr_linenumber" name="L35" href="#L35">35</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L36" href="#L36">36</a> <em class="jxr_javadoccomment"> * Validate signature/encryption/etc. algorithms against an AlgorithmSuite policy.</em> -<a class="jxr_linenumber" name="L37" href="#L37">37</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L38" href="#L38">38</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a name="AlgorithmSuiteValidator" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html#AlgorithmSuiteValidator">AlgorithmSuiteValidator</a> { -<a class="jxr_linenumber" name="L39" href="#L39">39</a> -<a class="jxr_linenumber" name="L40" href="#L40">40</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> org.slf4j.Logger LOG = -<a class="jxr_linenumber" name="L41" href="#L41">41</a> org.slf4j.LoggerFactory.getLogger(AlgorithmSuiteValidator.<strong class="jxr_keyword">class</strong>); -<a class="jxr_linenumber" name="L42" href="#L42">42</a> -<a class="jxr_linenumber" name="L43" href="#L43">43</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> <a name="AlgorithmSuite" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuite.html#AlgorithmSuite">AlgorithmSuite</a> algorithmSuite; -<a class="jxr_linenumber" name="L44" href="#L44">44</a> -<a class="jxr_linenumber" name="L45" href="#L45">45</a> <strong class="jxr_keyword">public</strong> <a name="AlgorithmSuiteValidator" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html#AlgorithmSuiteValidator">AlgorithmSuiteValidator</a>( -<a class="jxr_linenumber" name="L46" href="#L46">46</a> <a name="AlgorithmSuite" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuite.html#AlgorithmSuite">AlgorithmSuite</a> algorithmSuite -<a class="jxr_linenumber" name="L47" href="#L47">47</a> ) { -<a class="jxr_linenumber" name="L48" href="#L48">48</a> <strong class="jxr_keyword">this</strong>.algorithmSuite = algorithmSuite; -<a class="jxr_linenumber" name="L49" href="#L49">49</a> } -<a class="jxr_linenumber" name="L50" href="#L50">50</a> -<a class="jxr_linenumber" name="L51" href="#L51">51</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L52" href="#L52">52</a> <em class="jxr_javadoccomment"> * Check the Signature Method</em> -<a class="jxr_linenumber" name="L53" href="#L53">53</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L54" href="#L54">54</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureMethod( -<a class="jxr_linenumber" name="L55" href="#L55">55</a> String signatureMethod -<a class="jxr_linenumber" name="L56" href="#L56">56</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L57" href="#L57">57</a> Set<String> allowedSignatureMethods = algorithmSuite.getSignatureMethods(); -<a class="jxr_linenumber" name="L58" href="#L58">58</a> <strong class="jxr_keyword">if</strong> (!allowedSignatureMethods.isEmpty() -<a class="jxr_linenumber" name="L59" href="#L59">59</a> && !allowedSignatureMethods.contains(signatureMethod)) { -<a class="jxr_linenumber" name="L60" href="#L60">60</a> LOG.warn( -<a class="jxr_linenumber" name="L61" href="#L61">61</a> <span class="jxr_string">"SignatureMethod "</span> + signatureMethod + <span class="jxr_string">" does not match required values"</span> -<a class="jxr_linenumber" name="L62" href="#L62">62</a> ); -<a class="jxr_linenumber" name="L63" href="#L63">63</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L64" href="#L64">64</a> } -<a class="jxr_linenumber" name="L65" href="#L65">65</a> } -<a class="jxr_linenumber" name="L66" href="#L66">66</a> -<a class="jxr_linenumber" name="L67" href="#L67">67</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L68" href="#L68">68</a> <em class="jxr_javadoccomment"> * Check the C14n Algorithm</em> -<a class="jxr_linenumber" name="L69" href="#L69">69</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L70" href="#L70">70</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkC14nAlgorithm( -<a class="jxr_linenumber" name="L71" href="#L71">71</a> String c14nAlgorithm -<a class="jxr_linenumber" name="L72" href="#L72">72</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L73" href="#L73">73</a> Set<String> allowedC14nAlgorithms = algorithmSuite.getC14nAlgorithms(); -<a class="jxr_linenumber" name="L74" href="#L74">74</a> <strong class="jxr_keyword">if</strong> (!allowedC14nAlgorithms.isEmpty() && !allowedC14nAlgorithms.contains(c14nAlgorithm)) { -<a class="jxr_linenumber" name="L75" href="#L75">75</a> LOG.warn( -<a class="jxr_linenumber" name="L76" href="#L76">76</a> <span class="jxr_string">"C14nMethod "</span> + c14nAlgorithm + <span class="jxr_string">" does not match required value"</span> -<a class="jxr_linenumber" name="L77" href="#L77">77</a> ); -<a class="jxr_linenumber" name="L78" href="#L78">78</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L79" href="#L79">79</a> } -<a class="jxr_linenumber" name="L80" href="#L80">80</a> } -<a class="jxr_linenumber" name="L81" href="#L81">81</a> -<a class="jxr_linenumber" name="L82" href="#L82">82</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L83" href="#L83">83</a> <em class="jxr_javadoccomment"> * Check the Signature Algorithms</em> -<a class="jxr_linenumber" name="L84" href="#L84">84</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L85" href="#L85">85</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureAlgorithms( -<a class="jxr_linenumber" name="L86" href="#L86">86</a> XMLSignature xmlSignature -<a class="jxr_linenumber" name="L87" href="#L87">87</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L88" href="#L88">88</a> <em class="jxr_comment">// Signature Algorithm</em> -<a class="jxr_linenumber" name="L89" href="#L89">89</a> String signatureMethod = -<a class="jxr_linenumber" name="L90" href="#L90">90</a> xmlSignature.getSignedInfo().getSignatureMethod().getAlgorithm(); -<a class="jxr_linenumber" name="L91" href="#L91">91</a> checkSignatureMethod(signatureMethod); -<a class="jxr_linenumber" name="L92" href="#L92">92</a> -<a class="jxr_linenumber" name="L93" href="#L93">93</a> <em class="jxr_comment">// C14n Algorithm</em> -<a class="jxr_linenumber" name="L94" href="#L94">94</a> String c14nMethod = -<a class="jxr_linenumber" name="L95" href="#L95">95</a> xmlSignature.getSignedInfo().getCanonicalizationMethod().getAlgorithm(); -<a class="jxr_linenumber" name="L96" href="#L96">96</a> checkC14nAlgorithm(c14nMethod); -<a class="jxr_linenumber" name="L97" href="#L97">97</a> -<a class="jxr_linenumber" name="L98" href="#L98">98</a> <strong class="jxr_keyword">for</strong> (Object refObject : xmlSignature.getSignedInfo().getReferences()) { -<a class="jxr_linenumber" name="L99" href="#L99">99</a> Reference reference = (Reference)refObject; -<a class="jxr_linenumber" name="L100" href="#L100">100</a> <em class="jxr_comment">// Digest Algorithm</em> -<a class="jxr_linenumber" name="L101" href="#L101">101</a> String digestMethod = reference.getDigestMethod().getAlgorithm(); -<a class="jxr_linenumber" name="L102" href="#L102">102</a> Set<String> allowedDigestAlgorithms = algorithmSuite.getDigestAlgorithms(); -<a class="jxr_linenumber" name="L103" href="#L103">103</a> <strong class="jxr_keyword">if</strong> (!allowedDigestAlgorithms.isEmpty() -<a class="jxr_linenumber" name="L104" href="#L104">104</a> && !allowedDigestAlgorithms.contains(digestMethod)) { -<a class="jxr_linenumber" name="L105" href="#L105">105</a> LOG.warn( -<a class="jxr_linenumber" name="L106" href="#L106">106</a> <span class="jxr_string">"DigestMethod "</span> + digestMethod + <span class="jxr_string">" does not match required value"</span> -<a class="jxr_linenumber" name="L107" href="#L107">107</a> ); -<a class="jxr_linenumber" name="L108" href="#L108">108</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L109" href="#L109">109</a> } -<a class="jxr_linenumber" name="L110" href="#L110">110</a> -<a class="jxr_linenumber" name="L111" href="#L111">111</a> <em class="jxr_comment">// Transform Algorithms</em> -<a class="jxr_linenumber" name="L112" href="#L112">112</a> <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i < reference.getTransforms().size(); i++) { -<a class="jxr_linenumber" name="L113" href="#L113">113</a> Transform transform = (Transform)reference.getTransforms().get(i); -<a class="jxr_linenumber" name="L114" href="#L114">114</a> String algorithm = transform.getAlgorithm(); -<a class="jxr_linenumber" name="L115" href="#L115">115</a> Set<String> allowedTransformAlgorithms = -<a class="jxr_linenumber" name="L116" href="#L116">116</a> algorithmSuite.getTransformAlgorithms(); -<a class="jxr_linenumber" name="L117" href="#L117">117</a> <strong class="jxr_keyword">if</strong> (!allowedTransformAlgorithms.isEmpty() -<a class="jxr_linenumber" name="L118" href="#L118">118</a> && !allowedTransformAlgorithms.contains(algorithm)) { -<a class="jxr_linenumber" name="L119" href="#L119">119</a> LOG.warn( -<a class="jxr_linenumber" name="L120" href="#L120">120</a> <span class="jxr_string">"Transform method "</span> + algorithm + <span class="jxr_string">" does not match required value"</span> -<a class="jxr_linenumber" name="L121" href="#L121">121</a> ); -<a class="jxr_linenumber" name="L122" href="#L122">122</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L123" href="#L123">123</a> } -<a class="jxr_linenumber" name="L124" href="#L124">124</a> } -<a class="jxr_linenumber" name="L125" href="#L125">125</a> } -<a class="jxr_linenumber" name="L126" href="#L126">126</a> } -<a class="jxr_linenumber" name="L127" href="#L127">127</a> -<a class="jxr_linenumber" name="L128" href="#L128">128</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkEncryptionKeyWrapAlgorithm( -<a class="jxr_linenumber" name="L129" href="#L129">129</a> String keyWrapAlgorithm -<a class="jxr_linenumber" name="L130" href="#L130">130</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L131" href="#L131">131</a> Set<String> keyWrapAlgorithms = algorithmSuite.getKeyWrapAlgorithms(); -<a class="jxr_linenumber" name="L132" href="#L132">132</a> <strong class="jxr_keyword">if</strong> (!keyWrapAlgorithms.isEmpty() -<a class="jxr_linenumber" name="L133" href="#L133">133</a> && !keyWrapAlgorithms.contains(keyWrapAlgorithm)) { -<a class="jxr_linenumber" name="L134" href="#L134">134</a> LOG.warn( -<a class="jxr_linenumber" name="L135" href="#L135">135</a> <span class="jxr_string">"The Key transport method does not match the requirement"</span> -<a class="jxr_linenumber" name="L136" href="#L136">136</a> ); -<a class="jxr_linenumber" name="L137" href="#L137">137</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L138" href="#L138">138</a> } -<a class="jxr_linenumber" name="L139" href="#L139">139</a> } -<a class="jxr_linenumber" name="L140" href="#L140">140</a> -<a class="jxr_linenumber" name="L141" href="#L141">141</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSymmetricEncryptionAlgorithm( -<a class="jxr_linenumber" name="L142" href="#L142">142</a> String symmetricAlgorithm -<a class="jxr_linenumber" name="L143" href="#L143">143</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L144" href="#L144">144</a> Set<String> encryptionMethods = algorithmSuite.getEncryptionMethods(); -<a class="jxr_linenumber" name="L145" href="#L145">145</a> <strong class="jxr_keyword">if</strong> (!encryptionMethods.isEmpty() -<a class="jxr_linenumber" name="L146" href="#L146">146</a> && !encryptionMethods.contains(symmetricAlgorithm)) { -<a class="jxr_linenumber" name="L147" href="#L147">147</a> LOG.warn( -<a class="jxr_linenumber" name="L148" href="#L148">148</a> <span class="jxr_string">"The encryption algorithm does not match the requirement"</span> -<a class="jxr_linenumber" name="L149" href="#L149">149</a> ); -<a class="jxr_linenumber" name="L150" href="#L150">150</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L151" href="#L151">151</a> } -<a class="jxr_linenumber" name="L152" href="#L152">152</a> } -<a class="jxr_linenumber" name="L153" href="#L153">153</a> -<a class="jxr_linenumber" name="L154" href="#L154">154</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L155" href="#L155">155</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> -<a class="jxr_linenumber" name="L156" href="#L156">156</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L157" href="#L157">157</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( -<a class="jxr_linenumber" name="L158" href="#L158">158</a> X509Certificate[] x509Certificates -<a class="jxr_linenumber" name="L159" href="#L159">159</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L160" href="#L160">160</a> <strong class="jxr_keyword">if</strong> (x509Certificates == <strong class="jxr_keyword">null</strong>) { -<a class="jxr_linenumber" name="L161" href="#L161">161</a> <strong class="jxr_keyword">return</strong>; -<a class="jxr_linenumber" name="L162" href="#L162">162</a> } -<a class="jxr_linenumber" name="L163" href="#L163">163</a> -<a class="jxr_linenumber" name="L164" href="#L164">164</a> <strong class="jxr_keyword">for</strong> (X509Certificate cert : x509Certificates) { -<a class="jxr_linenumber" name="L165" href="#L165">165</a> checkAsymmetricKeyLength(cert.getPublicKey()); -<a class="jxr_linenumber" name="L166" href="#L166">166</a> } -<a class="jxr_linenumber" name="L167" href="#L167">167</a> } -<a class="jxr_linenumber" name="L168" href="#L168">168</a> -<a class="jxr_linenumber" name="L169" href="#L169">169</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L170" href="#L170">170</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> -<a class="jxr_linenumber" name="L171" href="#L171">171</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L172" href="#L172">172</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( -<a class="jxr_linenumber" name="L173" href="#L173">173</a> X509Certificate x509Certificate -<a class="jxr_linenumber" name="L174" href="#L174">174</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L175" href="#L175">175</a> <strong class="jxr_keyword">if</strong> (x509Certificate == <strong class="jxr_keyword">null</strong>) { -<a class="jxr_linenumber" name="L176" href="#L176">176</a> <strong class="jxr_keyword">return</strong>; -<a class="jxr_linenumber" name="L177" href="#L177">177</a> } -<a class="jxr_linenumber" name="L178" href="#L178">178</a> -<a class="jxr_linenumber" name="L179" href="#L179">179</a> checkAsymmetricKeyLength(x509Certificate.getPublicKey()); -<a class="jxr_linenumber" name="L180" href="#L180">180</a> } -<a class="jxr_linenumber" name="L181" href="#L181">181</a> -<a class="jxr_linenumber" name="L182" href="#L182">182</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L183" href="#L183">183</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> -<a class="jxr_linenumber" name="L184" href="#L184">184</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L185" href="#L185">185</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( -<a class="jxr_linenumber" name="L186" href="#L186">186</a> PublicKey publicKey -<a class="jxr_linenumber" name="L187" href="#L187">187</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L188" href="#L188">188</a> <strong class="jxr_keyword">if</strong> (publicKey == <strong class="jxr_keyword">null</strong>) { -<a class="jxr_linenumber" name="L189" href="#L189">189</a> <strong class="jxr_keyword">return</strong>; -<a class="jxr_linenumber" name="L190" href="#L190">190</a> } -<a class="jxr_linenumber" name="L191" href="#L191">191</a> <strong class="jxr_keyword">if</strong> (publicKey instanceof RSAPublicKey) { -<a class="jxr_linenumber" name="L192" href="#L192">192</a> <strong class="jxr_keyword">int</strong> modulus = ((RSAPublicKey)publicKey).getModulus().bitLength(); -<a class="jxr_linenumber" name="L193" href="#L193">193</a> <strong class="jxr_keyword">if</strong> (modulus < algorithmSuite.getMinimumAsymmetricKeyLength() -<a class="jxr_linenumber" name="L194" href="#L194">194</a> || modulus > algorithmSuite.getMaximumAsymmetricKeyLength()) { -<a class="jxr_linenumber" name="L195" href="#L195">195</a> LOG.warn( -<a class="jxr_linenumber" name="L196" href="#L196">196</a> <span class="jxr_string">"The asymmetric key length does not match the requirement"</span> -<a class="jxr_linenumber" name="L197" href="#L197">197</a> ); -<a class="jxr_linenumber" name="L198" href="#L198">198</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L199" href="#L199">199</a> } -<a class="jxr_linenumber" name="L200" href="#L200">200</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (publicKey instanceof DSAPublicKey) { -<a class="jxr_linenumber" name="L201" href="#L201">201</a> <strong class="jxr_keyword">int</strong> length = ((DSAPublicKey)publicKey).getParams().getP().bitLength(); -<a class="jxr_linenumber" name="L202" href="#L202">202</a> <strong class="jxr_keyword">if</strong> (length < algorithmSuite.getMinimumAsymmetricKeyLength() -<a class="jxr_linenumber" name="L203" href="#L203">203</a> || length > algorithmSuite.getMaximumAsymmetricKeyLength()) { -<a class="jxr_linenumber" name="L204" href="#L204">204</a> LOG.warn( -<a class="jxr_linenumber" name="L205" href="#L205">205</a> <span class="jxr_string">"The asymmetric key length does not match the requirement"</span> -<a class="jxr_linenumber" name="L206" href="#L206">206</a> ); -<a class="jxr_linenumber" name="L207" href="#L207">207</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L208" href="#L208">208</a> } -<a class="jxr_linenumber" name="L209" href="#L209">209</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (publicKey instanceof ECPublicKey) { -<a class="jxr_linenumber" name="L210" href="#L210">210</a> <strong class="jxr_keyword">final</strong> ECPublicKey ecpriv = (ECPublicKey) publicKey; -<a class="jxr_linenumber" name="L211" href="#L211">211</a> <strong class="jxr_keyword">final</strong> java.security.spec.ECParameterSpec spec = ecpriv.getParams(); -<a class="jxr_linenumber" name="L212" href="#L212">212</a> <strong class="jxr_keyword">int</strong> length = spec.getOrder().bitLength(); -<a class="jxr_linenumber" name="L213" href="#L213">213</a> <strong class="jxr_keyword">if</strong> (length < algorithmSuite.getMinimumEllipticCurveKeyLength() -<a class="jxr_linenumber" name="L214" href="#L214">214</a> || length > algorithmSuite.getMaximumEllipticCurveKeyLength()) { -<a class="jxr_linenumber" name="L215" href="#L215">215</a> LOG.warn(<span class="jxr_string">"The elliptic curve key length does not match the requirement"</span>); -<a class="jxr_linenumber" name="L216" href="#L216">216</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L217" href="#L217">217</a> } -<a class="jxr_linenumber" name="L218" href="#L218">218</a> } <strong class="jxr_keyword">else</strong> { -<a class="jxr_linenumber" name="L219" href="#L219">219</a> LOG.warn( -<a class="jxr_linenumber" name="L220" href="#L220">220</a> <span class="jxr_string">"An unknown public key was provided"</span> -<a class="jxr_linenumber" name="L221" href="#L221">221</a> ); -<a class="jxr_linenumber" name="L222" href="#L222">222</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L223" href="#L223">223</a> } -<a class="jxr_linenumber" name="L224" href="#L224">224</a> } -<a class="jxr_linenumber" name="L225" href="#L225">225</a> -<a class="jxr_linenumber" name="L226" href="#L226">226</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L227" href="#L227">227</a> <em class="jxr_javadoccomment"> * Check the symmetric key length</em> -<a class="jxr_linenumber" name="L228" href="#L228">228</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L229" href="#L229">229</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSymmetricKeyLength( -<a class="jxr_linenumber" name="L230" href="#L230">230</a> <strong class="jxr_keyword">int</strong> secretKeyLength -<a class="jxr_linenumber" name="L231" href="#L231">231</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L232" href="#L232">232</a> <strong class="jxr_keyword">if</strong> (secretKeyLength < (algorithmSuite.getMinimumSymmetricKeyLength() / 8) -<a class="jxr_linenumber" name="L233" href="#L233">233</a> || secretKeyLength > (algorithmSuite.getMaximumSymmetricKeyLength() / 8)) { -<a class="jxr_linenumber" name="L234" href="#L234">234</a> LOG.warn( -<a class="jxr_linenumber" name="L235" href="#L235">235</a> <span class="jxr_string">"The symmetric key length does not match the requirement"</span> -<a class="jxr_linenumber" name="L236" href="#L236">236</a> ); -<a class="jxr_linenumber" name="L237" href="#L237">237</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L238" href="#L238">238</a> } -<a class="jxr_linenumber" name="L239" href="#L239">239</a> } -<a class="jxr_linenumber" name="L240" href="#L240">240</a> -<a class="jxr_linenumber" name="L241" href="#L241">241</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L242" href="#L242">242</a> <em class="jxr_javadoccomment"> * Check Signature Derived Key length (in bytes)</em> -<a class="jxr_linenumber" name="L243" href="#L243">243</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L244" href="#L244">244</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureDerivedKeyLength( -<a class="jxr_linenumber" name="L245" href="#L245">245</a> <strong class="jxr_keyword">int</strong> derivedKeyLength -<a class="jxr_linenumber" name="L246" href="#L246">246</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L247" href="#L247">247</a> <strong class="jxr_keyword">int</strong> requiredKeyLength = algorithmSuite.getSignatureDerivedKeyLength(); -<a class="jxr_linenumber" name="L248" href="#L248">248</a> <strong class="jxr_keyword">if</strong> (requiredKeyLength > 0 && (derivedKeyLength / 8) != requiredKeyLength) { -<a class="jxr_linenumber" name="L249" href="#L249">249</a> LOG.warn( -<a class="jxr_linenumber" name="L250" href="#L250">250</a> <span class="jxr_string">"The signature derived key length of "</span> + derivedKeyLength + <span class="jxr_string">" does not match"</span> -<a class="jxr_linenumber" name="L251" href="#L251">251</a> + <span class="jxr_string">" the requirement of "</span> + requiredKeyLength -<a class="jxr_linenumber" name="L252" href="#L252">252</a> ); -<a class="jxr_linenumber" name="L253" href="#L253">253</a> } -<a class="jxr_linenumber" name="L254" href="#L254">254</a> } -<a class="jxr_linenumber" name="L255" href="#L255">255</a> -<a class="jxr_linenumber" name="L256" href="#L256">256</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L257" href="#L257">257</a> <em class="jxr_javadoccomment"> * Check Encryption Derived Key length (in bytes)</em> -<a class="jxr_linenumber" name="L258" href="#L258">258</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L259" href="#L259">259</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkEncryptionDerivedKeyLength( -<a class="jxr_linenumber" name="L260" href="#L260">260</a> <strong class="jxr_keyword">int</strong> derivedKeyLength -<a class="jxr_linenumber" name="L261" href="#L261">261</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L262" href="#L262">262</a> <strong class="jxr_keyword">int</strong> requiredKeyLength = algorithmSuite.getEncryptionDerivedKeyLength(); -<a class="jxr_linenumber" name="L263" href="#L263">263</a> <strong class="jxr_keyword">if</strong> (requiredKeyLength > 0 && (derivedKeyLength / 8) != requiredKeyLength) { -<a class="jxr_linenumber" name="L264" href="#L264">264</a> LOG.warn( -<a class="jxr_linenumber" name="L265" href="#L265">265</a> <span class="jxr_string">"The encryption derived key length of "</span> + derivedKeyLength + <span class="jxr_string">" does not match"</span> -<a class="jxr_linenumber" name="L266" href="#L266">266</a> + <span class="jxr_string">" the requirement of "</span> + requiredKeyLength -<a class="jxr_linenumber" name="L267" href="#L267">267</a> ); -<a class="jxr_linenumber" name="L268" href="#L268">268</a> } -<a class="jxr_linenumber" name="L269" href="#L269">269</a> } -<a class="jxr_linenumber" name="L270" href="#L270">270</a> -<a class="jxr_linenumber" name="L271" href="#L271">271</a> <em class="jxr_javadoccomment">/**</em> -<a class="jxr_linenumber" name="L272" href="#L272">272</a> <em class="jxr_javadoccomment"> * Check Derived Key algorithm</em> -<a class="jxr_linenumber" name="L273" href="#L273">273</a> <em class="jxr_javadoccomment"> */</em> -<a class="jxr_linenumber" name="L274" href="#L274">274</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkDerivedKeyAlgorithm( -<a class="jxr_linenumber" name="L275" href="#L275">275</a> String algorithm -<a class="jxr_linenumber" name="L276" href="#L276">276</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L277" href="#L277">277</a> Set<String> derivedKeyAlgorithms = algorithmSuite.getDerivedKeyAlgorithms(); -<a class="jxr_linenumber" name="L278" href="#L278">278</a> <strong class="jxr_keyword">if</strong> (!derivedKeyAlgorithms.isEmpty() -<a class="jxr_linenumber" name="L279" href="#L279">279</a> && !derivedKeyAlgorithms.contains(algorithm)) { -<a class="jxr_linenumber" name="L280" href="#L280">280</a> LOG.warn( -<a class="jxr_linenumber" name="L281" href="#L281">281</a> <span class="jxr_string">"The Derived Key Algorithm does not match the requirement"</span> -<a class="jxr_linenumber" name="L282" href="#L282">282</a> ); -<a class="jxr_linenumber" name="L283" href="#L283">283</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); -<a class="jxr_linenumber" name="L284" href="#L284">284</a> } -<a class="jxr_linenumber" name="L285" href="#L285">285</a> } +<a class="jxr_linenumber" name="L24" href="#L24">24</a> <strong class="jxr_keyword">import</strong> java.security.interfaces.*; +<a class="jxr_linenumber" name="L25" href="#L25">25</a> <strong class="jxr_keyword">import</strong> java.util.Set; +<a class="jxr_linenumber" name="L26" href="#L26">26</a> +<a class="jxr_linenumber" name="L27" href="#L27">27</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.Reference; +<a class="jxr_linenumber" name="L28" href="#L28">28</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.Transform; +<a class="jxr_linenumber" name="L29" href="#L29">29</a> <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.XMLSignature; +<a class="jxr_linenumber" name="L30" href="#L30">30</a> +<a class="jxr_linenumber" name="L31" href="#L31">31</a> <strong class="jxr_keyword">import</strong> org.apache.wss4j.common.ext.WSSecurityException; +<a class="jxr_linenumber" name="L32" href="#L32">32</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.exceptions.DERDecodingException; +<a class="jxr_linenumber" name="L33" href="#L33">33</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.DERDecoderUtils; +<a class="jxr_linenumber" name="L34" href="#L34">34</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.KeyUtils; +<a class="jxr_linenumber" name="L35" href="#L35">35</a> +<a class="jxr_linenumber" name="L36" href="#L36">36</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L37" href="#L37">37</a> <em class="jxr_javadoccomment"> * Validate signature/encryption/etc. algorithms against an AlgorithmSuite policy.</em> +<a class="jxr_linenumber" name="L38" href="#L38">38</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L39" href="#L39">39</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a name="AlgorithmSuiteValidator" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html#AlgorithmSuiteValidator">AlgorithmSuiteValidator</a> { +<a class="jxr_linenumber" name="L40" href="#L40">40</a> +<a class="jxr_linenumber" name="L41" href="#L41">41</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> org.slf4j.Logger LOG = +<a class="jxr_linenumber" name="L42" href="#L42">42</a> org.slf4j.LoggerFactory.getLogger(AlgorithmSuiteValidator.<strong class="jxr_keyword">class</strong>); +<a class="jxr_linenumber" name="L43" href="#L43">43</a> +<a class="jxr_linenumber" name="L44" href="#L44">44</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> <a name="AlgorithmSuite" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuite.html#AlgorithmSuite">AlgorithmSuite</a> algorithmSuite; +<a class="jxr_linenumber" name="L45" href="#L45">45</a> +<a class="jxr_linenumber" name="L46" href="#L46">46</a> <strong class="jxr_keyword">public</strong> <a name="AlgorithmSuiteValidator" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuiteValidator.html#AlgorithmSuiteValidator">AlgorithmSuiteValidator</a>( +<a class="jxr_linenumber" name="L47" href="#L47">47</a> <a name="AlgorithmSuite" href="../../../../../org/apache/wss4j/common/crypto/AlgorithmSuite.html#AlgorithmSuite">AlgorithmSuite</a> algorithmSuite +<a class="jxr_linenumber" name="L48" href="#L48">48</a> ) { +<a class="jxr_linenumber" name="L49" href="#L49">49</a> <strong class="jxr_keyword">this</strong>.algorithmSuite = algorithmSuite; +<a class="jxr_linenumber" name="L50" href="#L50">50</a> } +<a class="jxr_linenumber" name="L51" href="#L51">51</a> +<a class="jxr_linenumber" name="L52" href="#L52">52</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L53" href="#L53">53</a> <em class="jxr_javadoccomment"> * Check the Signature Method</em> +<a class="jxr_linenumber" name="L54" href="#L54">54</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L55" href="#L55">55</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureMethod( +<a class="jxr_linenumber" name="L56" href="#L56">56</a> String signatureMethod +<a class="jxr_linenumber" name="L57" href="#L57">57</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L58" href="#L58">58</a> Set<String> allowedSignatureMethods = algorithmSuite.getSignatureMethods(); +<a class="jxr_linenumber" name="L59" href="#L59">59</a> <strong class="jxr_keyword">if</strong> (!allowedSignatureMethods.isEmpty() +<a class="jxr_linenumber" name="L60" href="#L60">60</a> && !allowedSignatureMethods.contains(signatureMethod)) { +<a class="jxr_linenumber" name="L61" href="#L61">61</a> LOG.warn( +<a class="jxr_linenumber" name="L62" href="#L62">62</a> <span class="jxr_string">"SignatureMethod "</span> + signatureMethod + <span class="jxr_string">" does not match required values"</span> +<a class="jxr_linenumber" name="L63" href="#L63">63</a> ); +<a class="jxr_linenumber" name="L64" href="#L64">64</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L65" href="#L65">65</a> } +<a class="jxr_linenumber" name="L66" href="#L66">66</a> } +<a class="jxr_linenumber" name="L67" href="#L67">67</a> +<a class="jxr_linenumber" name="L68" href="#L68">68</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L69" href="#L69">69</a> <em class="jxr_javadoccomment"> * Check the C14n Algorithm</em> +<a class="jxr_linenumber" name="L70" href="#L70">70</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L71" href="#L71">71</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkC14nAlgorithm( +<a class="jxr_linenumber" name="L72" href="#L72">72</a> String c14nAlgorithm +<a class="jxr_linenumber" name="L73" href="#L73">73</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L74" href="#L74">74</a> Set<String> allowedC14nAlgorithms = algorithmSuite.getC14nAlgorithms(); +<a class="jxr_linenumber" name="L75" href="#L75">75</a> <strong class="jxr_keyword">if</strong> (!allowedC14nAlgorithms.isEmpty() && !allowedC14nAlgorithms.contains(c14nAlgorithm)) { +<a class="jxr_linenumber" name="L76" href="#L76">76</a> LOG.warn( +<a class="jxr_linenumber" name="L77" href="#L77">77</a> <span class="jxr_string">"C14nMethod "</span> + c14nAlgorithm + <span class="jxr_string">" does not match required value"</span> +<a class="jxr_linenumber" name="L78" href="#L78">78</a> ); +<a class="jxr_linenumber" name="L79" href="#L79">79</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L80" href="#L80">80</a> } +<a class="jxr_linenumber" name="L81" href="#L81">81</a> } +<a class="jxr_linenumber" name="L82" href="#L82">82</a> +<a class="jxr_linenumber" name="L83" href="#L83">83</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L84" href="#L84">84</a> <em class="jxr_javadoccomment"> * Check the Signature Algorithms</em> +<a class="jxr_linenumber" name="L85" href="#L85">85</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L86" href="#L86">86</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureAlgorithms( +<a class="jxr_linenumber" name="L87" href="#L87">87</a> XMLSignature xmlSignature +<a class="jxr_linenumber" name="L88" href="#L88">88</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L89" href="#L89">89</a> <em class="jxr_comment">// Signature Algorithm</em> +<a class="jxr_linenumber" name="L90" href="#L90">90</a> String signatureMethod = +<a class="jxr_linenumber" name="L91" href="#L91">91</a> xmlSignature.getSignedInfo().getSignatureMethod().getAlgorithm(); +<a class="jxr_linenumber" name="L92" href="#L92">92</a> checkSignatureMethod(signatureMethod); +<a class="jxr_linenumber" name="L93" href="#L93">93</a> +<a class="jxr_linenumber" name="L94" href="#L94">94</a> <em class="jxr_comment">// C14n Algorithm</em> +<a class="jxr_linenumber" name="L95" href="#L95">95</a> String c14nMethod = +<a class="jxr_linenumber" name="L96" href="#L96">96</a> xmlSignature.getSignedInfo().getCanonicalizationMethod().getAlgorithm(); +<a class="jxr_linenumber" name="L97" href="#L97">97</a> checkC14nAlgorithm(c14nMethod); +<a class="jxr_linenumber" name="L98" href="#L98">98</a> +<a class="jxr_linenumber" name="L99" href="#L99">99</a> <strong class="jxr_keyword">for</strong> (Object refObject : xmlSignature.getSignedInfo().getReferences()) { +<a class="jxr_linenumber" name="L100" href="#L100">100</a> Reference reference = (Reference)refObject; +<a class="jxr_linenumber" name="L101" href="#L101">101</a> <em class="jxr_comment">// Digest Algorithm</em> +<a class="jxr_linenumber" name="L102" href="#L102">102</a> String digestMethod = reference.getDigestMethod().getAlgorithm(); +<a class="jxr_linenumber" name="L103" href="#L103">103</a> Set<String> allowedDigestAlgorithms = algorithmSuite.getDigestAlgorithms(); +<a class="jxr_linenumber" name="L104" href="#L104">104</a> <strong class="jxr_keyword">if</strong> (!allowedDigestAlgorithms.isEmpty() +<a class="jxr_linenumber" name="L105" href="#L105">105</a> && !allowedDigestAlgorithms.contains(digestMethod)) { +<a class="jxr_linenumber" name="L106" href="#L106">106</a> LOG.warn( +<a class="jxr_linenumber" name="L107" href="#L107">107</a> <span class="jxr_string">"DigestMethod "</span> + digestMethod + <span class="jxr_string">" does not match required value"</span> +<a class="jxr_linenumber" name="L108" href="#L108">108</a> ); +<a class="jxr_linenumber" name="L109" href="#L109">109</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L110" href="#L110">110</a> } +<a class="jxr_linenumber" name="L111" href="#L111">111</a> +<a class="jxr_linenumber" name="L112" href="#L112">112</a> <em class="jxr_comment">// Transform Algorithms</em> +<a class="jxr_linenumber" name="L113" href="#L113">113</a> <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i < reference.getTransforms().size(); i++) { +<a class="jxr_linenumber" name="L114" href="#L114">114</a> Transform transform = (Transform)reference.getTransforms().get(i); +<a class="jxr_linenumber" name="L115" href="#L115">115</a> String algorithm = transform.getAlgorithm(); +<a class="jxr_linenumber" name="L116" href="#L116">116</a> Set<String> allowedTransformAlgorithms = +<a class="jxr_linenumber" name="L117" href="#L117">117</a> algorithmSuite.getTransformAlgorithms(); +<a class="jxr_linenumber" name="L118" href="#L118">118</a> <strong class="jxr_keyword">if</strong> (!allowedTransformAlgorithms.isEmpty() +<a class="jxr_linenumber" name="L119" href="#L119">119</a> && !allowedTransformAlgorithms.contains(algorithm)) { +<a class="jxr_linenumber" name="L120" href="#L120">120</a> LOG.warn( +<a class="jxr_linenumber" name="L121" href="#L121">121</a> <span class="jxr_string">"Transform method "</span> + algorithm + <span class="jxr_string">" does not match required value"</span> +<a class="jxr_linenumber" name="L122" href="#L122">122</a> ); +<a class="jxr_linenumber" name="L123" href="#L123">123</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L124" href="#L124">124</a> } +<a class="jxr_linenumber" name="L125" href="#L125">125</a> } +<a class="jxr_linenumber" name="L126" href="#L126">126</a> } +<a class="jxr_linenumber" name="L127" href="#L127">127</a> } +<a class="jxr_linenumber" name="L128" href="#L128">128</a> +<a class="jxr_linenumber" name="L129" href="#L129">129</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkEncryptionKeyWrapAlgorithm( +<a class="jxr_linenumber" name="L130" href="#L130">130</a> String keyWrapAlgorithm +<a class="jxr_linenumber" name="L131" href="#L131">131</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L132" href="#L132">132</a> Set<String> keyWrapAlgorithms = algorithmSuite.getKeyWrapAlgorithms(); +<a class="jxr_linenumber" name="L133" href="#L133">133</a> <strong class="jxr_keyword">if</strong> (!keyWrapAlgorithms.isEmpty() +<a class="jxr_linenumber" name="L134" href="#L134">134</a> && !keyWrapAlgorithms.contains(keyWrapAlgorithm)) { +<a class="jxr_linenumber" name="L135" href="#L135">135</a> LOG.warn( +<a class="jxr_linenumber" name="L136" href="#L136">136</a> <span class="jxr_string">"The Key transport method does not match the requirement"</span> +<a class="jxr_linenumber" name="L137" href="#L137">137</a> ); +<a class="jxr_linenumber" name="L138" href="#L138">138</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L139" href="#L139">139</a> } +<a class="jxr_linenumber" name="L140" href="#L140">140</a> } +<a class="jxr_linenumber" name="L141" href="#L141">141</a> +<a class="jxr_linenumber" name="L142" href="#L142">142</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkKeyAgreementMethodAlgorithm( +<a class="jxr_linenumber" name="L143" href="#L143">143</a> String keyAgreementMethodAlgorithm +<a class="jxr_linenumber" name="L144" href="#L144">144</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L145" href="#L145">145</a> Set<String> keyAgreementMethodAlgorithms = algorithmSuite.getKeyAgreementMethodAlgorithms(); +<a class="jxr_linenumber" name="L146" href="#L146">146</a> <strong class="jxr_keyword">if</strong> (!keyAgreementMethodAlgorithms.isEmpty() +<a class="jxr_linenumber" name="L147" href="#L147">147</a> && !keyAgreementMethodAlgorithms.contains(keyAgreementMethodAlgorithm)) { +<a class="jxr_linenumber" name="L148" href="#L148">148</a> LOG.warn( +<a class="jxr_linenumber" name="L149" href="#L149">149</a> <span class="jxr_string">"The Key agreement method does not match the requirement"</span> +<a class="jxr_linenumber" name="L150" href="#L150">150</a> ); +<a class="jxr_linenumber" name="L151" href="#L151">151</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L152" href="#L152">152</a> } +<a class="jxr_linenumber" name="L153" href="#L153">153</a> } +<a class="jxr_linenumber" name="L154" href="#L154">154</a> +<a class="jxr_linenumber" name="L155" href="#L155">155</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L156" href="#L156">156</a> <em class="jxr_javadoccomment"> * Method to check the Key Derivation algorithm is on the approved list of the</em> +<a class="jxr_linenumber" name="L157" href="#L157">157</a> <em class="jxr_javadoccomment"> * AlgorithmSuite configuration.</em> +<a class="jxr_linenumber" name="L158" href="#L158">158</a> <em class="jxr_javadoccomment"> * @param keyDerivationFunction the key derivation function to be validated</em> +<a class="jxr_linenumber" name="L159" href="#L159">159</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException if the approved list is not empty and the key</em> +<a class="jxr_linenumber" name="L160" href="#L160">160</a> <em class="jxr_javadoccomment"> * derivation function is not on the list</em> +<a class="jxr_linenumber" name="L161" href="#L161">161</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L162" href="#L162">162</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkKeyDerivationFunction( +<a class="jxr_linenumber" name="L163" href="#L163">163</a> String keyDerivationFunction +<a class="jxr_linenumber" name="L164" href="#L164">164</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L165" href="#L165">165</a> Set<String> keyDerivationFunctions = algorithmSuite.getDerivedKeyAlgorithms(); +<a class="jxr_linenumber" name="L166" href="#L166">166</a> <strong class="jxr_keyword">if</strong> (!keyDerivationFunctions.isEmpty() +<a class="jxr_linenumber" name="L167" href="#L167">167</a> && !keyDerivationFunctions.contains(keyDerivationFunction)) { +<a class="jxr_linenumber" name="L168" href="#L168">168</a> LOG.warn( +<a class="jxr_linenumber" name="L169" href="#L169">169</a> <span class="jxr_string">"The Key derivation function does not match the requirement"</span> +<a class="jxr_linenumber" name="L170" href="#L170">170</a> ); +<a class="jxr_linenumber" name="L171" href="#L171">171</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L172" href="#L172">172</a> } +<a class="jxr_linenumber" name="L173" href="#L173">173</a> } +<a class="jxr_linenumber" name="L174" href="#L174">174</a> +<a class="jxr_linenumber" name="L175" href="#L175">175</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSymmetricEncryptionAlgorithm( +<a class="jxr_linenumber" name="L176" href="#L176">176</a> String symmetricAlgorithm +<a class="jxr_linenumber" name="L177" href="#L177">177</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L178" href="#L178">178</a> Set<String> encryptionMethods = algorithmSuite.getEncryptionMethods(); +<a class="jxr_linenumber" name="L179" href="#L179">179</a> <strong class="jxr_keyword">if</strong> (!encryptionMethods.isEmpty() +<a class="jxr_linenumber" name="L180" href="#L180">180</a> && !encryptionMethods.contains(symmetricAlgorithm)) { +<a class="jxr_linenumber" name="L181" href="#L181">181</a> LOG.warn( +<a class="jxr_linenumber" name="L182" href="#L182">182</a> <span class="jxr_string">"The encryption algorithm does not match the requirement"</span> +<a class="jxr_linenumber" name="L183" href="#L183">183</a> ); +<a class="jxr_linenumber" name="L184" href="#L184">184</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L185" href="#L185">185</a> } +<a class="jxr_linenumber" name="L186" href="#L186">186</a> } +<a class="jxr_linenumber" name="L187" href="#L187">187</a> +<a class="jxr_linenumber" name="L188" href="#L188">188</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L189" href="#L189">189</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> +<a class="jxr_linenumber" name="L190" href="#L190">190</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L191" href="#L191">191</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( +<a class="jxr_linenumber" name="L192" href="#L192">192</a> X509Certificate[] x509Certificates +<a class="jxr_linenumber" name="L193" href="#L193">193</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L194" href="#L194">194</a> <strong class="jxr_keyword">if</strong> (x509Certificates == <strong class="jxr_keyword">null</strong>) { +<a class="jxr_linenumber" name="L195" href="#L195">195</a> <strong class="jxr_keyword">return</strong>; +<a class="jxr_linenumber" name="L196" href="#L196">196</a> } +<a class="jxr_linenumber" name="L197" href="#L197">197</a> +<a class="jxr_linenumber" name="L198" href="#L198">198</a> <strong class="jxr_keyword">for</strong> (X509Certificate cert : x509Certificates) { +<a class="jxr_linenumber" name="L199" href="#L199">199</a> checkAsymmetricKeyLength(cert.getPublicKey()); +<a class="jxr_linenumber" name="L200" href="#L200">200</a> } +<a class="jxr_linenumber" name="L201" href="#L201">201</a> } +<a class="jxr_linenumber" name="L202" href="#L202">202</a> +<a class="jxr_linenumber" name="L203" href="#L203">203</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L204" href="#L204">204</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> +<a class="jxr_linenumber" name="L205" href="#L205">205</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L206" href="#L206">206</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( +<a class="jxr_linenumber" name="L207" href="#L207">207</a> X509Certificate x509Certificate +<a class="jxr_linenumber" name="L208" href="#L208">208</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L209" href="#L209">209</a> <strong class="jxr_keyword">if</strong> (x509Certificate == <strong class="jxr_keyword">null</strong>) { +<a class="jxr_linenumber" name="L210" href="#L210">210</a> <strong class="jxr_keyword">return</strong>; +<a class="jxr_linenumber" name="L211" href="#L211">211</a> } +<a class="jxr_linenumber" name="L212" href="#L212">212</a> +<a class="jxr_linenumber" name="L213" href="#L213">213</a> checkAsymmetricKeyLength(x509Certificate.getPublicKey()); +<a class="jxr_linenumber" name="L214" href="#L214">214</a> } +<a class="jxr_linenumber" name="L215" href="#L215">215</a> +<a class="jxr_linenumber" name="L216" href="#L216">216</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L217" href="#L217">217</a> <em class="jxr_javadoccomment"> * Check the asymmetric key length</em> +<a class="jxr_linenumber" name="L218" href="#L218">218</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L219" href="#L219">219</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkAsymmetricKeyLength( +<a class="jxr_linenumber" name="L220" href="#L220">220</a> PublicKey publicKey +<a class="jxr_linenumber" name="L221" href="#L221">221</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L222" href="#L222">222</a> <strong class="jxr_keyword">if</strong> (publicKey == <strong class="jxr_keyword">null</strong>) { +<a class="jxr_linenumber" name="L223" href="#L223">223</a> <strong class="jxr_keyword">return</strong>; +<a class="jxr_linenumber" name="L224" href="#L224">224</a> } +<a class="jxr_linenumber" name="L225" href="#L225">225</a> <strong class="jxr_keyword">if</strong> (publicKey instanceof RSAPublicKey) { +<a class="jxr_linenumber" name="L226" href="#L226">226</a> <strong class="jxr_keyword">int</strong> modulus = ((RSAPublicKey)publicKey).getModulus().bitLength(); +<a class="jxr_linenumber" name="L227" href="#L227">227</a> <strong class="jxr_keyword">if</strong> (modulus < algorithmSuite.getMinimumAsymmetricKeyLength() +<a class="jxr_linenumber" name="L228" href="#L228">228</a> || modulus > algorithmSuite.getMaximumAsymmetricKeyLength()) { +<a class="jxr_linenumber" name="L229" href="#L229">229</a> LOG.warn( +<a class="jxr_linenumber" name="L230" href="#L230">230</a> <span class="jxr_string">"The asymmetric key length does not match the requirement"</span> +<a class="jxr_linenumber" name="L231" href="#L231">231</a> ); +<a class="jxr_linenumber" name="L232" href="#L232">232</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L233" href="#L233">233</a> } +<a class="jxr_linenumber" name="L234" href="#L234">234</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (publicKey instanceof DSAPublicKey) { +<a class="jxr_linenumber" name="L235" href="#L235">235</a> <strong class="jxr_keyword">int</strong> length = ((DSAPublicKey)publicKey).getParams().getP().bitLength(); +<a class="jxr_linenumber" name="L236" href="#L236">236</a> <strong class="jxr_keyword">if</strong> (length < algorithmSuite.getMinimumAsymmetricKeyLength() +<a class="jxr_linenumber" name="L237" href="#L237">237</a> || length > algorithmSuite.getMaximumAsymmetricKeyLength()) { +<a class="jxr_linenumber" name="L238" href="#L238">238</a> LOG.warn( +<a class="jxr_linenumber" name="L239" href="#L239">239</a> <span class="jxr_string">"The asymmetric key length does not match the requirement"</span> +<a class="jxr_linenumber" name="L240" href="#L240">240</a> ); +<a class="jxr_linenumber" name="L241" href="#L241">241</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L242" href="#L242">242</a> } +<a class="jxr_linenumber" name="L243" href="#L243">243</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (publicKey instanceof ECPublicKey) { +<a class="jxr_linenumber" name="L244" href="#L244">244</a> <strong class="jxr_keyword">final</strong> ECPublicKey ecpriv = (ECPublicKey) publicKey; +<a class="jxr_linenumber" name="L245" href="#L245">245</a> <strong class="jxr_keyword">final</strong> java.security.spec.ECParameterSpec spec = ecpriv.getParams(); +<a class="jxr_linenumber" name="L246" href="#L246">246</a> <strong class="jxr_keyword">int</strong> length = spec.getOrder().bitLength(); +<a class="jxr_linenumber" name="L247" href="#L247">247</a> <strong class="jxr_keyword">if</strong> (length < algorithmSuite.getMinimumEllipticCurveKeyLength() +<a class="jxr_linenumber" name="L248" href="#L248">248</a> || length > algorithmSuite.getMaximumEllipticCurveKeyLength()) { +<a class="jxr_linenumber" name="L249" href="#L249">249</a> LOG.warn(<span class="jxr_string">"The elliptic curve key length does not match the requirement"</span>); +<a class="jxr_linenumber" name="L250" href="#L250">250</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L251" href="#L251">251</a> } +<a class="jxr_linenumber" name="L252" href="#L252">252</a> } <strong class="jxr_keyword">else</strong> { +<a class="jxr_linenumber" name="L253" href="#L253">253</a> <em class="jxr_comment">// Try with last supported key types EdEC and XDH</em> +<a class="jxr_linenumber" name="L254" href="#L254">254</a> <strong class="jxr_keyword">int</strong> keySize = getEdECndXDHKeyLength(publicKey); +<a class="jxr_linenumber" name="L255" href="#L255">255</a> <strong class="jxr_keyword">if</strong> (keySize < algorithmSuite.getMinimumEllipticCurveKeyLength() +<a class="jxr_linenumber" name="L256" href="#L256">256</a> || keySize > algorithmSuite.getMaximumEllipticCurveKeyLength()) { +<a class="jxr_linenumber" name="L257" href="#L257">257</a> LOG.warn( +<a class="jxr_linenumber" name="L258" href="#L258">258</a> <span class="jxr_string">"The asymmetric key length does not match the requirement"</span> +<a class="jxr_linenumber" name="L259" href="#L259">259</a> ); +<a class="jxr_linenumber" name="L260" href="#L260">260</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L261" href="#L261">261</a> } +<a class="jxr_linenumber" name="L262" href="#L262">262</a> } +<a class="jxr_linenumber" name="L263" href="#L263">263</a> } +<a class="jxr_linenumber" name="L264" href="#L264">264</a> +<a class="jxr_linenumber" name="L265" href="#L265">265</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L266" href="#L266">266</a> <em class="jxr_javadoccomment"> * A generic method to determinate key length for keys x25519, x448, ed25519 and ed448 keys. Method does not rely on</em> +<a class="jxr_linenumber" name="L267" href="#L267">267</a> <em class="jxr_javadoccomment"> * any specific implementation of the key, but uses OID to determine the key type.</em> +<a class="jxr_linenumber" name="L268" href="#L268">268</a> <em class="jxr_javadoccomment"> *</em> +<a class="jxr_linenumber" name="L269" href="#L269">269</a> <em class="jxr_javadoccomment"> * @param publicKey the public key to check the key length</em> +<a class="jxr_linenumber" name="L270" href="#L270">270</a> <em class="jxr_javadoccomment"> * @return the key length in bits</em> +<a class="jxr_linenumber" name="L271" href="#L271">271</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException if the key is not EdEC or XDH or if length can not be determined</em> +<a class="jxr_linenumber" name="L272" href="#L272">272</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L273" href="#L273">273</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">int</strong> getEdECndXDHKeyLength(PublicKey publicKey) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L274" href="#L274">274</a> String keyAlgorithmOId; +<a class="jxr_linenumber" name="L275" href="#L275">275</a> <strong class="jxr_keyword">try</strong> { +<a class="jxr_linenumber" name="L276" href="#L276">276</a> keyAlgorithmOId = DERDecoderUtils.getAlgorithmIdFromPublicKey(publicKey); +<a class="jxr_linenumber" name="L277" href="#L277">277</a> } <strong class="jxr_keyword">catch</strong> (DERDecodingException e) { +<a class="jxr_linenumber" name="L278" href="#L278">278</a> LOG.warn(<span class="jxr_string">"Can not parse the public key to determine key size!"</span>, e); +<a class="jxr_linenumber" name="L279" href="#L279">279</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L280" href="#L280">280</a> } +<a class="jxr_linenumber" name="L281" href="#L281">281</a> KeyUtils.KeyType keyType = KeyUtils.KeyType.getByOid(keyAlgorithmOId); +<a class="jxr_linenumber" name="L282" href="#L282">282</a> <strong class="jxr_keyword">if</strong> (keyType == <strong class="jxr_keyword">null</strong>) { +<a class="jxr_linenumber" name="L283" href="#L283">283</a> LOG.warn(<span class="jxr_string">"An unknown public key was provided"</span>); +<a class="jxr_linenumber" name="L284" href="#L284">284</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L285" href="#L285">285</a> } <a class="jxr_linenumber" name="L286" href="#L286">286</a> -<a class="jxr_linenumber" name="L287" href="#L287">287</a> } +<a class="jxr_linenumber" name="L287" href="#L287">287</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">switch</strong> (keyType) { +<a class="jxr_linenumber" name="L288" href="#L288">288</a> <strong class="jxr_keyword">case</strong> ED25519, X25519 -> 256; +<a class="jxr_linenumber" name="L289" href="#L289">289</a> <strong class="jxr_keyword">case</strong> ED448, X448 -> 456; +<a class="jxr_linenumber" name="L290" href="#L290">290</a> <strong class="jxr_keyword">default</strong> -> { +<a class="jxr_linenumber" name="L291" href="#L291">291</a> LOG.warn( +<a class="jxr_linenumber" name="L292" href="#L292">292</a> <span class="jxr_string">"An unknown public key was provided"</span> +<a class="jxr_linenumber" name="L293" href="#L293">293</a> ); +<a class="jxr_linenumber" name="L294" href="#L294">294</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L295" href="#L295">295</a> } +<a class="jxr_linenumber" name="L296" href="#L296">296</a> }; +<a class="jxr_linenumber" name="L297" href="#L297">297</a> } +<a class="jxr_linenumber" name="L298" href="#L298">298</a> +<a class="jxr_linenumber" name="L299" href="#L299">299</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L300" href="#L300">300</a> <em class="jxr_javadoccomment"> * Check the symmetric key length</em> +<a class="jxr_linenumber" name="L301" href="#L301">301</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L302" href="#L302">302</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSymmetricKeyLength( +<a class="jxr_linenumber" name="L303" href="#L303">303</a> <strong class="jxr_keyword">int</strong> secretKeyLength +<a class="jxr_linenumber" name="L304" href="#L304">304</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L305" href="#L305">305</a> <strong class="jxr_keyword">if</strong> (secretKeyLength < (algorithmSuite.getMinimumSymmetricKeyLength() / 8) +<a class="jxr_linenumber" name="L306" href="#L306">306</a> || secretKeyLength > (algorithmSuite.getMaximumSymmetricKeyLength() / 8)) { +<a class="jxr_linenumber" name="L307" href="#L307">307</a> LOG.warn( +<a class="jxr_linenumber" name="L308" href="#L308">308</a> <span class="jxr_string">"The symmetric key length does not match the requirement"</span> +<a class="jxr_linenumber" name="L309" href="#L309">309</a> ); +<a class="jxr_linenumber" name="L310" href="#L310">310</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L311" href="#L311">311</a> } +<a class="jxr_linenumber" name="L312" href="#L312">312</a> } +<a class="jxr_linenumber" name="L313" href="#L313">313</a> +<a class="jxr_linenumber" name="L314" href="#L314">314</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L315" href="#L315">315</a> <em class="jxr_javadoccomment"> * Check Signature Derived Key length (in bytes)</em> +<a class="jxr_linenumber" name="L316" href="#L316">316</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L317" href="#L317">317</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkSignatureDerivedKeyLength( +<a class="jxr_linenumber" name="L318" href="#L318">318</a> <strong class="jxr_keyword">int</strong> derivedKeyLength +<a class="jxr_linenumber" name="L319" href="#L319">319</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L320" href="#L320">320</a> <strong class="jxr_keyword">int</strong> requiredKeyLength = algorithmSuite.getSignatureDerivedKeyLength(); +<a class="jxr_linenumber" name="L321" href="#L321">321</a> <strong class="jxr_keyword">if</strong> (requiredKeyLength > 0 && (derivedKeyLength / 8) != requiredKeyLength) { +<a class="jxr_linenumber" name="L322" href="#L322">322</a> LOG.warn( +<a class="jxr_linenumber" name="L323" href="#L323">323</a> <span class="jxr_string">"The signature derived key length of "</span> + derivedKeyLength + <span class="jxr_string">" does not match"</span> +<a class="jxr_linenumber" name="L324" href="#L324">324</a> + <span class="jxr_string">" the requirement of "</span> + requiredKeyLength +<a class="jxr_linenumber" name="L325" href="#L325">325</a> ); +<a class="jxr_linenumber" name="L326" href="#L326">326</a> } +<a class="jxr_linenumber" name="L327" href="#L327">327</a> } +<a class="jxr_linenumber" name="L328" href="#L328">328</a> +<a class="jxr_linenumber" name="L329" href="#L329">329</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L330" href="#L330">330</a> <em class="jxr_javadoccomment"> * Check Encryption Derived Key length (in bytes)</em> +<a class="jxr_linenumber" name="L331" href="#L331">331</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L332" href="#L332">332</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkEncryptionDerivedKeyLength( +<a class="jxr_linenumber" name="L333" href="#L333">333</a> <strong class="jxr_keyword">int</strong> derivedKeyLength +<a class="jxr_linenumber" name="L334" href="#L334">334</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L335" href="#L335">335</a> <strong class="jxr_keyword">int</strong> requiredKeyLength = algorithmSuite.getEncryptionDerivedKeyLength(); +<a class="jxr_linenumber" name="L336" href="#L336">336</a> <strong class="jxr_keyword">if</strong> (requiredKeyLength > 0 && (derivedKeyLength / 8) != requiredKeyLength) { +<a class="jxr_linenumber" name="L337" href="#L337">337</a> LOG.warn( +<a class="jxr_linenumber" name="L338" href="#L338">338</a> <span class="jxr_string">"The encryption derived key length of "</span> + derivedKeyLength + <span class="jxr_string">" does not match"</span> +<a class="jxr_linenumber" name="L339" href="#L339">339</a> + <span class="jxr_string">" the requirement of "</span> + requiredKeyLength +<a class="jxr_linenumber" name="L340" href="#L340">340</a> ); +<a class="jxr_linenumber" name="L341" href="#L341">341</a> } +<a class="jxr_linenumber" name="L342" href="#L342">342</a> } +<a class="jxr_linenumber" name="L343" href="#L343">343</a> +<a class="jxr_linenumber" name="L344" href="#L344">344</a> <em class="jxr_javadoccomment">/**</em> +<a class="jxr_linenumber" name="L345" href="#L345">345</a> <em class="jxr_javadoccomment"> * Check Derived Key algorithm</em> +<a class="jxr_linenumber" name="L346" href="#L346">346</a> <em class="jxr_javadoccomment"> */</em> +<a class="jxr_linenumber" name="L347" href="#L347">347</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> checkDerivedKeyAlgorithm( +<a class="jxr_linenumber" name="L348" href="#L348">348</a> String algorithm +<a class="jxr_linenumber" name="L349" href="#L349">349</a> ) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { +<a class="jxr_linenumber" name="L350" href="#L350">350</a> Set<String> derivedKeyAlgorithms = algorithmSuite.getDerivedKeyAlgorithms(); +<a class="jxr_linenumber" name="L351" href="#L351">351</a> <strong class="jxr_keyword">if</strong> (!derivedKeyAlgorithms.isEmpty() +<a class="jxr_linenumber" name="L352" href="#L352">352</a> && !derivedKeyAlgorithms.contains(algorithm)) { +<a class="jxr_linenumber" name="L353" href="#L353">353</a> LOG.warn( +<a class="jxr_linenumber" name="L354" href="#L354">354</a> <span class="jxr_string">"The Derived Key Algorithm does not match the requirement"</span> +<a class="jxr_linenumber" name="L355" href="#L355">355</a> ); +<a class="jxr_linenumber" name="L356" href="#L356">356</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a>(WSSecurityException.ErrorCode.INVALID_SECURITY); +<a class="jxr_linenumber" name="L357" href="#L357">357</a> } +<a class="jxr_linenumber" name="L358" href="#L358">358</a> } +<a class="jxr_linenumber" name="L359" href="#L359">359</a> +<a class="jxr_linenumber" name="L360" href="#L360">360</a> } </pre> <hr/> -<div id="footer">Copyright © 2004–2023 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</div> +<div id="footer">© 2004â2024 <a href="https://www.apache.org/">The Apache Software Foundation</a></div> </body> </html>
Modified: webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/BouncyCastleUtils.html URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/BouncyCastleUtils.html?rev=1921891&r1=1921890&r2=1921891&view=diff ============================================================================== --- webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/BouncyCastleUtils.html (original) +++ webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/BouncyCastleUtils.html Thu Nov 14 16:06:47 2024 @@ -67,6 +67,6 @@ <a class="jxr_linenumber" name="L59" href="#L59">59</a> </pre> <hr/> -<div id="footer">Copyright © 2004–2023 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</div> +<div id="footer">© 2004â2024 <a href="https://www.apache.org/">The Apache Software Foundation</a></div> </body> </html> Modified: webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CertificateStore.html URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CertificateStore.html?rev=1921891&r1=1921890&r2=1921891&view=diff ============================================================================== --- webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CertificateStore.html (original) +++ webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CertificateStore.html Thu Nov 14 16:06:47 2024 @@ -116,7 +116,7 @@ <a class="jxr_linenumber" name="L108" href="#L108">108</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em> <a class="jxr_linenumber" name="L109" href="#L109">109</a> <em class="jxr_javadoccomment"> */</em> <a class="jxr_linenumber" name="L110" href="#L110">110</a> <strong class="jxr_keyword">public</strong> String getX509Identifier(X509Certificate cert) <strong class="jxr_keyword">throws</strong> <a name="WSSecurityException" href="../../../../../org/apache/wss4j/common/ext/WSSecurityException.html#WSSecurityException">WSSecurityException</a> { -<a class="jxr_linenumber" name="L111" href="#L111">111</a> <strong class="jxr_keyword">return</strong> cert.getSubjectDN().toString(); +<a class="jxr_linenumber" name="L111" href="#L111">111</a> <strong class="jxr_keyword">return</strong> cert.getSubjectX500Principal().toString(); <a class="jxr_linenumber" name="L112" href="#L112">112</a> } <a class="jxr_linenumber" name="L113" href="#L113">113</a> <a class="jxr_linenumber" name="L114" href="#L114">114</a> <em class="jxr_javadoccomment">/**</em> @@ -462,6 +462,6 @@ <a class="jxr_linenumber" name="L454" href="#L454">454</a> } </pre> <hr/> -<div id="footer">Copyright © 2004–2023 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</div> +<div id="footer">© 2004â2024 <a href="https://www.apache.org/">The Apache Software Foundation</a></div> </body> </html> Modified: webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/Crypto.html URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/Crypto.html?rev=1921891&r1=1921890&r2=1921891&view=diff ============================================================================== --- webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/Crypto.html (original) +++ webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/Crypto.html Thu Nov 14 16:06:47 2024 @@ -236,6 +236,6 @@ <a class="jxr_linenumber" name="L228" href="#L228">228</a> } </pre> <hr/> -<div id="footer">Copyright © 2004–2023 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</div> +<div id="footer">© 2004â2024 <a href="https://www.apache.org/">The Apache Software Foundation</a></div> </body> </html> Modified: webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CryptoBase.html URL: http://svn.apache.org/viewvc/webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CryptoBase.html?rev=1921891&r1=1921890&r2=1921891&view=diff ============================================================================== --- webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CryptoBase.html (original) +++ webservices/website/wss4j/xref/org/apache/wss4j/common/crypto/CryptoBase.html Thu Nov 14 16:06:47 2024 @@ -348,7 +348,7 @@ <a class="jxr_linenumber" name="L340" href="#L340">340</a> LOG.debug(<span class="jxr_string">"The certificate is null so no constraints matching was possible"</span>); <a class="jxr_linenumber" name="L341" href="#L341">341</a> <strong class="jxr_keyword">return</strong> false; <a class="jxr_linenumber" name="L342" href="#L342">342</a> } -<a class="jxr_linenumber" name="L343" href="#L343">343</a> String issuerDn = cert.getIssuerDN().getName(); +<a class="jxr_linenumber" name="L343" href="#L343">343</a> String issuerDn = cert.getIssuerX500Principal().getName(); <a class="jxr_linenumber" name="L344" href="#L344">344</a> <strong class="jxr_keyword">return</strong> matchesName(issuerDn, issuerDNPatterns); <a class="jxr_linenumber" name="L345" href="#L345">345</a> } <a class="jxr_linenumber" name="L346" href="#L346">346</a> @@ -420,6 +420,6 @@ <a class="jxr_linenumber" name="L412" href="#L412">412</a> } </pre> <hr/> -<div id="footer">Copyright © 2004–2023 <a href="https://www.apache.org/">The Apache Software Foundation</a>. All rights reserved.</div> +<div id="footer">© 2004â2024 <a href="https://www.apache.org/">The Apache Software Foundation</a></div> </body> </html>