blob: 7db5e3d9c685f257185a7a5197f13bd31b73302a [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.xml.security.test.dom.interop;
import org.apache.xml.security.test.dom.utils.resolver.OfflineResolver;
import org.apache.xml.security.utils.resolver.ResourceResolverSpi;
import static org.junit.Assert.*;
import java.nio.charset.StandardCharsets;
import org.apache.xml.security.signature.XMLSignatureException;
/**
* This test is to ensure interoperability with the examples provided by Merlin Huges
* from Baltimore using KeyTools XML. These test vectors are located in the directory
* <CODE>data/ie/baltimore/merlin-examples/</CODE>.
*
* @see <A HREF="http://www.baltimore.com/keytools/xml/index.html">The KeyTools XML Website</A>
*/
public class BaltimoreTest extends InteropTestBase {
static org.slf4j.Logger LOG =
org.slf4j.LoggerFactory.getLogger(BaltimoreTest.class);
/** Field merlinsDir15 */
static String merlinsDir15 =
"src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-fifteen/";
static String merlinsDir16 =
"src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-sixteen";
static String merlinsDir23 =
"src/test/resources/ie/baltimore/merlin-examples/merlin-xmldsig-twenty-three/";
static {
String basedir = System.getProperty("basedir");
if(basedir != null && !"".equals(basedir)) {
merlinsDir15 = basedir + "/" + merlinsDir15;
merlinsDir16 = basedir + "/" + merlinsDir16;
merlinsDir23 = basedir + "/" + merlinsDir23;
}
org.apache.xml.security.Init.init();
}
/**
* Constructor BaltimoreTest
*/
public BaltimoreTest() {
super();
}
/**
* Method test_fifteen_enveloping_hmac_sha1
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloping_hmac_sha1() throws Exception {
String filename = merlinsDir15 + "signature-enveloping-hmac-sha1.xml";
boolean verify = this.verifyHMAC(filename, new OfflineResolver(), false,
"secret".getBytes(StandardCharsets.US_ASCII));
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_enveloping_hmac_sha1_40
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloping_hmac_sha1_40() throws Exception {
String filename = merlinsDir15 + "signature-enveloping-hmac-sha1-40.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
byte[] hmacKey = "secret".getBytes(StandardCharsets.US_ASCII);
try {
this.verifyHMAC(filename, resolver, followManifests, hmacKey);
fail("HMACOutputLength Exception not caught");
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
} catch (XMLSignatureException ex) {
if (!ex.getMsgID().equals("algorithms.HMACOutputLengthMin")) {
fail(ex.getMessage());
}
}
}
/**
* Method test_fifteen_enveloped_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloped_dsa() throws Exception {
String filename = merlinsDir15 + "signature-enveloped-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_enveloping_b64_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloping_b64_dsa() throws Exception {
String filename = merlinsDir15 + "signature-enveloping-b64-dsa.xml";
ResourceResolverSpi resolver = null;
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_enveloping_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloping_dsa() throws Exception {
String filename = merlinsDir15 + "signature-enveloping-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_enveloping_rsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_enveloping_rsa() throws Exception {
String filename = merlinsDir15 + "signature-enveloping-rsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_external_b64_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_external_b64_dsa() throws Exception {
String filename = merlinsDir15 + "signature-external-b64-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_fifteen_external_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_fifteen_external_dsa() throws Exception {
String filename = merlinsDir15 + "signature-external-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_sixteen_external_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_sixteen_external_dsa() throws Exception {
String filename =
merlinsDir16 + "/signature.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_sixteen_bad_signature. This tests make sure that an
* invalid signature is not valid. This is validating merlin's 16
* signature but some of the referenced content has been modified so
* some of the references should be invalid.
*
* @throws Exception
*/
@org.junit.Test
public void test_sixteen_bad_signature() throws Exception {
String filename =
merlinsDir16 + "/bad-signature.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (verify) {
LOG.error("Verification passed (should have failed) for " + filename);
}
assertFalse(filename, verify);
}
/**
* Method test_twenty_three_enveloping_hmac_sha1
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloping_hmac_sha1() throws Exception {
String filename = merlinsDir23 + "signature-enveloping-hmac-sha1.xml";
boolean verify = this.verifyHMAC(filename, new OfflineResolver(), false,
"secret".getBytes(StandardCharsets.US_ASCII));
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_enveloping_hmac_sha1_40
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloping_hmac_sha1_40() throws Exception {
String filename = merlinsDir23 + "signature-enveloping-hmac-sha1-40.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
byte[] hmacKey = "secret".getBytes(StandardCharsets.US_ASCII);
try {
this.verifyHMAC(filename, resolver, followManifests, hmacKey);
fail("HMACOutputLength Exception not caught");
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
} catch (XMLSignatureException ex) {
if (!ex.getMsgID().equals("algorithms.HMACOutputLengthMin")) {
fail(ex.getMessage());
}
}
}
/**
* Method test_twenty_three_enveloped_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloped_dsa() throws Exception {
String filename = merlinsDir23 + "signature-enveloped-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_enveloping_b64_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloping_b64_dsa() throws Exception {
String filename = merlinsDir23 + "signature-enveloping-b64-dsa.xml";
ResourceResolverSpi resolver = null;
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_enveloping_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloping_dsa() throws Exception {
String filename = merlinsDir23 + "signature-enveloping-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_enveloping_rsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_enveloping_rsa() throws Exception {
String filename = merlinsDir23 + "signature-enveloping-rsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_external_b64_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_external_b64_dsa() throws Exception {
String filename = merlinsDir23 + "signature-external-b64-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_external_dsa
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_external_dsa() throws Exception {
String filename = merlinsDir23 + "signature-external-dsa.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
/**
* Method test_twenty_three_external_dsa_2
*
* @throws Exception
*/
@org.junit.Test
public void test_twenty_three_external_dsa_2() throws Exception {
String filename =
merlinsDir23 + "signature.xml";
ResourceResolverSpi resolver = new OfflineResolver();
boolean followManifests = false;
boolean verify = false;
try {
verify = this.verify(filename, resolver, followManifests);
} catch (RuntimeException ex) {
LOG.error("Verification crashed for " + filename);
throw ex;
}
if (!verify) {
LOG.error("Verification failed for " + filename);
}
assertTrue(filename, verify);
}
}