| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.xml.security.test.dom.interop; |
| |
| import org.apache.xml.security.test.dom.utils.resolver.OfflineResolver; |
| import org.apache.xml.security.utils.resolver.ResourceResolverSpi; |
| |
| |
| import java.nio.charset.StandardCharsets; |
| |
| import org.apache.xml.security.signature.XMLSignatureException; |
| |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertTrue; |
| import static org.junit.Assert.fail; |
| |
| |
| /** |
| * This test is to ensure interoperability with the examples provided by Merlin Huges |
| * from Baltimore using KeyTools XML. These test vectors are located in the directory |
| * <CODE>data/ie/baltimore/merlin-examples/</CODE>. |
| * |
| * @see <A HREF="http://www.baltimore.com/keytools/xml/index.html">The KeyTools XML Website</A> |
| */ |
| public class BaltimoreTest extends InteropTestBase { |
| |
| static org.slf4j.Logger LOG = |
| org.slf4j.LoggerFactory.getLogger(BaltimoreTest.class); |
| |
| /** Field merlinsDir15 */ |
| static String merlinsDir15 = |
| "src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-fifteen/"; |
| static String merlinsDir16 = |
| "src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-sixteen"; |
| static String merlinsDir23 = |
| "src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-twenty-three/"; |
| |
| static { |
| String basedir = System.getProperty("basedir"); |
| if(basedir != null && !"".equals(basedir)) { |
| merlinsDir15 = basedir + "/" + merlinsDir15; |
| merlinsDir16 = basedir + "/" + merlinsDir16; |
| merlinsDir23 = basedir + "/" + merlinsDir23; |
| } |
| org.apache.xml.security.Init.init(); |
| } |
| |
| /** |
| * Constructor BaltimoreTest |
| */ |
| public BaltimoreTest() { |
| super(); |
| } |
| |
| /** |
| * Method test_fifteen_enveloping_hmac_sha1 |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloping_hmac_sha1() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloping-hmac-sha1.xml"; |
| boolean verify = this.verifyHMAC(filename, new OfflineResolver(), false, |
| "secret".getBytes(StandardCharsets.US_ASCII)); |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_enveloping_hmac_sha1_40 |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloping_hmac_sha1_40() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloping-hmac-sha1-40.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| byte[] hmacKey = "secret".getBytes(StandardCharsets.US_ASCII); |
| |
| try { |
| this.verifyHMAC(filename, resolver, followManifests, hmacKey); |
| fail("HMACOutputLength Exception not caught"); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } catch (XMLSignatureException ex) { |
| if (!"algorithms.HMACOutputLengthMin".equals(ex.getMsgID())) { |
| fail(ex.getMessage()); |
| } |
| } |
| } |
| |
| /** |
| * Method test_fifteen_enveloped_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloped_dsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloped-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_enveloping_b64_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloping_b64_dsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloping-b64-dsa.xml"; |
| ResourceResolverSpi resolver = null; |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_enveloping_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloping_dsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloping-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_enveloping_rsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_enveloping_rsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-enveloping-rsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_external_b64_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_external_b64_dsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-external-b64-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_fifteen_external_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_fifteen_external_dsa() throws Exception { |
| |
| String filename = merlinsDir15 + "signature-external-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_sixteen_external_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_sixteen_external_dsa() throws Exception { |
| |
| String filename = |
| merlinsDir16 + "/signature.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_sixteen_bad_signature. This tests make sure that an |
| * invalid signature is not valid. This is validating merlin's 16 |
| * signature but some of the referenced content has been modified so |
| * some of the references should be invalid. |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_sixteen_bad_signature() throws Exception { |
| |
| String filename = |
| merlinsDir16 + "/bad-signature.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (verify) { |
| LOG.error("Verification passed (should have failed) for " + filename); |
| } |
| |
| assertFalse(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_enveloping_hmac_sha1 |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloping_hmac_sha1() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloping-hmac-sha1.xml"; |
| boolean verify = this.verifyHMAC(filename, new OfflineResolver(), false, |
| "secret".getBytes(StandardCharsets.US_ASCII)); |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_enveloping_hmac_sha1_40 |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloping_hmac_sha1_40() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloping-hmac-sha1-40.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| byte[] hmacKey = "secret".getBytes(StandardCharsets.US_ASCII); |
| |
| try { |
| this.verifyHMAC(filename, resolver, followManifests, hmacKey); |
| fail("HMACOutputLength Exception not caught"); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } catch (XMLSignatureException ex) { |
| if (!"algorithms.HMACOutputLengthMin".equals(ex.getMsgID())) { |
| fail(ex.getMessage()); |
| } |
| } |
| } |
| |
| /** |
| * Method test_twenty_three_enveloped_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloped_dsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloped-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_enveloping_b64_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloping_b64_dsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloping-b64-dsa.xml"; |
| ResourceResolverSpi resolver = null; |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_enveloping_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloping_dsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloping-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_enveloping_rsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_enveloping_rsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-enveloping-rsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_external_b64_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_external_b64_dsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-external-b64-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_external_dsa |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_external_dsa() throws Exception { |
| |
| String filename = merlinsDir23 + "signature-external-dsa.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| /** |
| * Method test_twenty_three_external_dsa_2 |
| * |
| * @throws Exception |
| */ |
| @org.junit.Test |
| public void test_twenty_three_external_dsa_2() throws Exception { |
| |
| String filename = |
| merlinsDir23 + "signature.xml"; |
| ResourceResolverSpi resolver = new OfflineResolver(); |
| boolean followManifests = false; |
| boolean verify = false; |
| |
| try { |
| verify = this.verify(filename, resolver, followManifests); |
| } catch (RuntimeException ex) { |
| LOG.error("Verification crashed for " + filename); |
| throw ex; |
| } |
| |
| if (!verify) { |
| LOG.error("Verification failed for " + filename); |
| } |
| |
| assertTrue(filename, verify); |
| } |
| |
| } |