| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package javax.xml.crypto.test.dsig; |
| |
| import static org.junit.Assert.*; |
| |
| import java.io.File; |
| import java.nio.charset.StandardCharsets; |
| import java.security.Security; |
| import org.w3c.dom.Document; |
| import org.w3c.dom.Element; |
| import org.w3c.dom.NodeList; |
| |
| import javax.xml.crypto.test.KeySelectors; |
| import javax.xml.crypto.Data; |
| import javax.xml.crypto.URIDereferencer; |
| import javax.xml.crypto.URIReference; |
| import javax.xml.crypto.URIReferenceException; |
| import javax.xml.crypto.XMLCryptoContext; |
| import javax.xml.crypto.dsig.XMLSignatureException; |
| import javax.xml.crypto.dsig.XMLSignatureFactory; |
| import javax.xml.crypto.dsig.dom.DOMValidateContext; |
| |
| /** |
| * This is a testcase that validates various signatures |
| * |
| */ |
| public class ValidateSignatureTest { |
| |
| private SignatureValidator validator; |
| private File dir; |
| |
| static { |
| Security.insertProviderAt |
| (new org.apache.jcp.xml.dsig.internal.dom.XMLDSigRI(), 1); |
| } |
| |
| public ValidateSignatureTest() { |
| String fs = System.getProperty("file.separator"); |
| String base = System.getProperty("basedir") == null ? "./": System.getProperty("basedir"); |
| |
| dir = new File(base + fs + "src/test/resources" + fs |
| + "javax" + fs + "xml" + fs + "crypto", "dsig"); |
| validator = new SignatureValidator(dir); |
| } |
| |
| /** |
| * Validates a signature that references an element with an ID attribute. |
| * The element's ID needs to be registered so that it can be found. |
| */ |
| @org.junit.Test |
| public void test_signature_with_ID() throws Exception { |
| String file = "envelopingSignature.xml"; |
| |
| DOMValidateContext vc = validator.getValidateContext |
| (file, new KeySelectors.KeyValueKeySelector()); |
| Document doc = vc.getNode().getOwnerDocument(); |
| NodeList nl = doc.getElementsByTagName("Assertion"); |
| vc.setIdAttributeNS((Element) nl.item(0), null, "AssertionID"); |
| boolean coreValidity = validator.validate(vc); |
| assertTrue("Signature failed core validation", coreValidity); |
| } |
| |
| @org.junit.Test |
| public void test_signature_external_c14n_xmlattrs() throws Exception { |
| String file = "signature-external-c14n-xmlatrs.xml"; |
| |
| boolean coreValidity = validator.validate(file, |
| new KeySelectors.SecretKeySelector("secret".getBytes(StandardCharsets.US_ASCII))); |
| assertTrue("Signature failed core validation", coreValidity); |
| } |
| |
| /** |
| * This test checks that the signature is verified before the references. |
| */ |
| @org.junit.Test |
| public void test_invalid_signature() throws Exception { |
| InvalidURIDereferencer ud = new InvalidURIDereferencer(); |
| |
| boolean coreValidity = validator.validate("invalid-signature.xml", |
| new KeySelectors.KeyValueKeySelector(), ud); |
| assertFalse("Invalid signature should fail!", coreValidity); |
| assertTrue("References validated before signature", ud.dereferenced); |
| } |
| |
| @org.junit.Test |
| public void test_signature_enveloping_hmac_sha1_trunclen_0() throws Exception { |
| try { |
| validator.validate |
| ("signature-enveloping-hmac-sha1-trunclen-0-attack.xml", |
| new KeySelectors.SecretKeySelector("secret".getBytes(StandardCharsets.US_ASCII))); |
| fail("Expected HMACOutputLength exception"); |
| } catch (XMLSignatureException xse) { |
| // System.out.println(xse.getMessage()); |
| // pass |
| } |
| } |
| |
| @org.junit.Test |
| public void test_signature_enveloping_hmac_sha1_trunclen_8() throws Exception { |
| |
| try { |
| validator.validate |
| ("signature-enveloping-hmac-sha1-trunclen-8-attack.xml", |
| new KeySelectors.SecretKeySelector("secret".getBytes(StandardCharsets.US_ASCII))); |
| fail("Expected HMACOutputLength exception"); |
| } catch (XMLSignatureException xse) { |
| // System.out.println(xse.getMessage()); |
| // pass |
| } |
| } |
| |
| // Bug 47761: validates an xml signature containing a reference with |
| // xmlns:xml attributes. C14n should not emit these attributes. |
| @org.junit.Test |
| public void test_signature_exclc14n_xmlnamespace() throws Exception { |
| String file = "demo.signed.xml"; |
| boolean coreValidity = validator.validate(file, |
| new KeySelectors.RawX509KeySelector()); |
| assertTrue("Signature failed core validation", coreValidity); |
| } |
| |
| // Bug https://issues.apache.org/jira/browse/SANTUARIO-295 |
| // Validates a signature with an XPathFilter2 Transform with an intersect |
| // filter that produces an empty node-set. |
| @org.junit.Test |
| public void test_signature_xpathfilter2() throws Exception { |
| String file = "xmldsig-xfilter2.xml"; |
| boolean coreValidity = validator.validate |
| (file, new KeySelectors.KeyValueKeySelector()); |
| assertTrue("Signature failed core validation", coreValidity); |
| } |
| |
| /** |
| * Set flag if called. |
| */ |
| static class InvalidURIDereferencer implements URIDereferencer { |
| boolean dereferenced = false; |
| private URIDereferencer ud = |
| XMLSignatureFactory.getInstance().getURIDereferencer(); |
| |
| public Data dereference(final URIReference ref, XMLCryptoContext ctx) |
| throws URIReferenceException { |
| dereferenced = true; |
| |
| // fallback |
| return ud.dereference(ref, ctx); |
| } |
| } |
| |
| } |