| /* |
| * The Apache Software License, Version 1.1 |
| * |
| * |
| * Copyright (c) 1999 The Apache Software Foundation. All rights |
| * reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. The end-user documentation included with the redistribution, |
| * if any, must include the following acknowledgment: |
| * "This product includes software developed by the |
| * Apache Software Foundation (http://www.apache.org/)." |
| * Alternately, this acknowledgment may appear in the software itself, |
| * if and wherever such third-party acknowledgments normally appear. |
| * |
| * 4. The names "<WebSig>" and "Apache Software Foundation" must |
| * not be used to endorse or promote products derived from this |
| * software without prior written permission. For written |
| * permission, please contact apache@apache.org. |
| * |
| * 5. Products derived from this software may not be called "Apache", |
| * nor may "Apache" appear in their name, without prior written |
| * permission of the Apache Software Foundation. |
| * |
| * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED |
| * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| * DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF |
| * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
| * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
| * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT |
| * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| * ==================================================================== |
| * |
| * This software consists of voluntary contributions made by many |
| * individuals on behalf of the Apache Software Foundation and was |
| * originally based on software copyright (c) 2001, Institute for |
| * Data Communications Systems, <http://www.nue.et-inf.uni-siegen.de/>. |
| * The development of this software was partly funded by the European |
| * Commission in the <WebSig> project in the ISIS Programme. |
| * For more information on the Apache Software Foundation, please see |
| * <http://www.apache.org/>. |
| */ |
| package org.apache.xml.security.algorithms.implementations; |
| |
| |
| |
| import java.security.InvalidAlgorithmParameterException; |
| import java.security.InvalidKeyException; |
| import java.security.Key; |
| import java.security.SecureRandom; |
| import java.security.spec.AlgorithmParameterSpec; |
| |
| import javax.crypto.Mac; |
| import javax.crypto.SecretKey; |
| import javax.xml.transform.TransformerException; |
| |
| import org.apache.xml.security.algorithms.JCEMapper; |
| import org.apache.xml.security.algorithms.MessageDigestAlgorithm; |
| import org.apache.xml.security.algorithms.SignatureAlgorithmSpi; |
| import org.apache.xml.security.signature.XMLSignature; |
| import org.apache.xml.security.signature.XMLSignatureException; |
| import org.apache.xml.security.utils.Constants; |
| import org.apache.xml.security.utils.HexDump; |
| import org.apache.xml.security.utils.XMLUtils; |
| import org.apache.xpath.XPathAPI; |
| import org.w3c.dom.Document; |
| import org.w3c.dom.Element; |
| import org.w3c.dom.Text; |
| |
| |
| /** |
| * |
| * @author $Author$ |
| */ |
| public abstract class IntegrityHmac extends SignatureAlgorithmSpi { |
| |
| /** {@link org.apache.commons.logging} logging facility */ |
| static org.apache.commons.logging.Log log = |
| org.apache.commons.logging.LogFactory.getLog(IntegrityHmacSHA1.class.getName()); |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public abstract String engineGetURI(); |
| |
| /** Field _macAlgorithm */ |
| private Mac _macAlgorithm = null; |
| |
| /** Field _HMACOutputLength */ |
| int _HMACOutputLength = 0; |
| |
| /** |
| * Method IntegrityHmacSHA1das |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmac() throws XMLSignatureException { |
| |
| JCEMapper.ProviderIdClass algorithmID = |
| JCEMapper.translateURItoJCEID(this.engineGetURI()); |
| |
| log.debug("Created IntegrityHmacSHA1 using " |
| + algorithmID.getAlgorithmID() + " " |
| + algorithmID.getProviderId()); |
| |
| try { |
| this._macAlgorithm = Mac.getInstance(algorithmID.getAlgorithmID(), |
| algorithmID.getProviderId()); |
| } catch (java.security.NoSuchAlgorithmException ex) { |
| Object[] exArgs = { algorithmID.getAlgorithmID(), |
| ex.getLocalizedMessage() }; |
| |
| throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs); |
| } catch (java.security.NoSuchProviderException ex) { |
| Object[] exArgs = { algorithmID.getProviderId(), |
| ex.getLocalizedMessage() }; |
| |
| throw new XMLSignatureException("algorithms.NoSuchProvider", exArgs); |
| } |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#setParameter} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param params |
| * @throws XMLSignatureException |
| */ |
| protected void engineSetParameter(AlgorithmParameterSpec params) |
| throws XMLSignatureException { |
| throw new XMLSignatureException("empty"); |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#verify} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param signature |
| * |
| * @throws XMLSignatureException |
| */ |
| protected boolean engineVerify(byte[] signature) |
| throws XMLSignatureException { |
| |
| try { |
| byte[] completeResult = this._macAlgorithm.doFinal(); |
| |
| if ((this._HMACOutputLength == 0) || (this._HMACOutputLength >= 160)) { |
| log.debug("completeResult = " |
| + HexDump.byteArrayToHexString(completeResult)); |
| log.debug("signature = " |
| + HexDump.byteArrayToHexString(signature)); |
| |
| return MessageDigestAlgorithm.isEqual(completeResult, signature); |
| } else { |
| log.debug("completeResult = " |
| + HexDump.byteArrayToHexString(completeResult)); |
| |
| byte[] stripped = IntegrityHmac.reduceBitLength(completeResult, |
| this._HMACOutputLength); |
| |
| log.debug("stripped = " |
| + HexDump.byteArrayToHexString(stripped)); |
| log.debug("signature = " |
| + HexDump.byteArrayToHexString(signature)); |
| |
| return MessageDigestAlgorithm.isEqual(stripped, signature); |
| } |
| } catch (IllegalStateException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#initVerify} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param secretKey |
| * @throws XMLSignatureException |
| */ |
| protected void engineInitVerify(Key secretKey) throws XMLSignatureException { |
| |
| if (!(secretKey instanceof SecretKey)) { |
| String supplied = secretKey.getClass().getName(); |
| String needed = SecretKey.class.getName(); |
| Object exArgs[] = { supplied, needed }; |
| |
| throw new XMLSignatureException("algorithms.WrongKeyForThisOperation", |
| exArgs); |
| } |
| |
| try { |
| this._macAlgorithm.init(secretKey); |
| } catch (InvalidKeyException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#sign} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @return the result of the {@link java.security.Signature#sign} method |
| * @throws XMLSignatureException |
| */ |
| protected byte[] engineSign() throws XMLSignatureException { |
| |
| try { |
| byte[] completeResult = this._macAlgorithm.doFinal(); |
| |
| if ((this._HMACOutputLength == 0) || (this._HMACOutputLength >= 160)) { |
| return completeResult; |
| } else { |
| return IntegrityHmac.reduceBitLength(completeResult, |
| this._HMACOutputLength); |
| } |
| } catch (IllegalStateException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Method reduceBitLength |
| * |
| * @param completeResult |
| * @param length |
| * |
| */ |
| private static byte[] reduceBitLength(byte completeResult[], int length) { |
| |
| int bytes = length / 8; |
| int abits = length % 8; |
| byte[] strippedResult = new byte[bytes + ((abits == 0) |
| ? 0 |
| : 1)]; |
| |
| System.arraycopy(completeResult, 0, strippedResult, 0, bytes); |
| |
| if (abits > 0) { |
| byte[] MASK = { (byte) 0x00, (byte) 0x80, (byte) 0xC0, (byte) 0xE0, |
| (byte) 0xF0, (byte) 0xF8, (byte) 0xFC, (byte) 0xFE }; |
| |
| strippedResult[bytes] = (byte) (completeResult[bytes] & MASK[abits]); |
| } |
| |
| return strippedResult; |
| } |
| |
| /** |
| * Method engineInitSign |
| * |
| * @param secretKey |
| * @throws XMLSignatureException |
| */ |
| protected void engineInitSign(Key secretKey) throws XMLSignatureException { |
| |
| if (!(secretKey instanceof SecretKey)) { |
| String supplied = secretKey.getClass().getName(); |
| String needed = SecretKey.class.getName(); |
| Object exArgs[] = { supplied, needed }; |
| |
| throw new XMLSignatureException("algorithms.WrongKeyForThisOperation", |
| exArgs); |
| } |
| |
| try { |
| this._macAlgorithm.init(secretKey); |
| } catch (InvalidKeyException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Method engineInitSign |
| * |
| * @param secretKey |
| * @param algorithmParameterSpec |
| * @throws XMLSignatureException |
| */ |
| protected void engineInitSign( |
| Key secretKey, AlgorithmParameterSpec algorithmParameterSpec) |
| throws XMLSignatureException { |
| |
| if (!(secretKey instanceof SecretKey)) { |
| String supplied = secretKey.getClass().getName(); |
| String needed = SecretKey.class.getName(); |
| Object exArgs[] = { supplied, needed }; |
| |
| throw new XMLSignatureException("algorithms.WrongKeyForThisOperation", |
| exArgs); |
| } |
| |
| try { |
| this._macAlgorithm.init(secretKey, algorithmParameterSpec); |
| } catch (InvalidKeyException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } catch (InvalidAlgorithmParameterException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Method engineInitSign |
| * |
| * @param secretKey |
| * @param secureRandom |
| * @throws XMLSignatureException |
| */ |
| protected void engineInitSign(Key secretKey, SecureRandom secureRandom) |
| throws XMLSignatureException { |
| throw new XMLSignatureException("algorithms.CannotUseSecureRandomOnMAC"); |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#update} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param input |
| * @throws XMLSignatureException |
| */ |
| protected void engineUpdate(byte[] input) throws XMLSignatureException { |
| |
| try { |
| this._macAlgorithm.update(input); |
| } catch (IllegalStateException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#update} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param input |
| * @throws XMLSignatureException |
| */ |
| protected void engineUpdate(byte input) throws XMLSignatureException { |
| |
| try { |
| this._macAlgorithm.update(input); |
| } catch (IllegalStateException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Proxy method for {@link java.security.Signature#update} |
| * which is executed on the internal {@link java.security.Signature} object. |
| * |
| * @param buf |
| * @param offset |
| * @param len |
| * @throws XMLSignatureException |
| */ |
| protected void engineUpdate(byte buf[], int offset, int len) |
| throws XMLSignatureException { |
| |
| try { |
| this._macAlgorithm.update(buf, offset, len); |
| } catch (IllegalStateException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| |
| /** |
| * Method engineGetJCEAlgorithmString |
| * |
| * |
| */ |
| protected String engineGetJCEAlgorithmString() { |
| |
| log.debug("engineGetJCEAlgorithmString()"); |
| |
| return this._macAlgorithm.getAlgorithm(); |
| } |
| |
| /** |
| * Method engineGetJCEAlgorithmString |
| * |
| * |
| */ |
| protected String engineGetJCEProviderName() { |
| return this._macAlgorithm.getProvider().getName(); |
| } |
| |
| /** |
| * Method engineSetHMACOutputLength |
| * |
| * @param HMACOutputLength |
| */ |
| protected void engineSetHMACOutputLength(int HMACOutputLength) { |
| this._HMACOutputLength = HMACOutputLength; |
| } |
| |
| /** |
| * Method engineGetContextFromElement |
| * |
| * @param element |
| * @throws XMLSignatureException |
| */ |
| protected void engineGetContextFromElement(Element element) |
| throws XMLSignatureException { |
| |
| super.engineGetContextFromElement(element); |
| |
| if (element == null) { |
| throw new XMLSignatureException("empty"); |
| } |
| |
| if ((element.getChildNodes() != null) |
| && (element.getChildNodes().getLength() > 0)) { |
| try { |
| Element nscontext = XMLUtils.createDSctx(element.getOwnerDocument(), |
| "ds", |
| Constants.SignatureSpecNS); |
| Text hmaclength = (Text) XPathAPI.selectSingleNode(element, |
| "./ds:" + Constants._TAG_HMACOUTPUTLENGTH |
| + "/text()", nscontext); |
| |
| if (hmaclength != null) { |
| this._HMACOutputLength = Integer.parseInt(hmaclength.getData()); |
| } |
| } catch (TransformerException ex) { |
| throw new XMLSignatureException("empty", ex); |
| } |
| } |
| } |
| |
| /** |
| * Method engineAddContextToElement |
| * |
| * @param element |
| * @throws XMLSignatureException |
| */ |
| protected void engineAddContextToElement(Element element) |
| throws XMLSignatureException { |
| |
| if (element == null) { |
| throw new XMLSignatureException("empty"); |
| } |
| |
| if (this._HMACOutputLength != 0) { |
| Document doc = element.getOwnerDocument(); |
| Element HMElem = XMLUtils.createElementInSignatureSpace(doc, |
| Constants._TAG_HMACOUTPUTLENGTH); |
| Text HMText = |
| doc.createTextNode(new Integer(this._HMACOutputLength).toString()); |
| |
| HMElem.appendChild(HMText); |
| XMLUtils.addReturnToElement(element); |
| element.appendChild(HMElem); |
| XMLUtils.addReturnToElement(element); |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacSHA1 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacSHA1 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacSHA1 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacSHA1() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_SHA1; |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacSHA256 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacSHA256 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacSHA256 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacSHA256() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_SHA256; |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacSHA384 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacSHA384 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacSHA384 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacSHA384() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_SHA384; |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacSHA512 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacSHA512 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacSHA512 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacSHA512() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_SHA512; |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacRIPEMD160 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacRIPEMD160 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacRIPEMD160 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacRIPEMD160() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_RIPEMD160; |
| } |
| } |
| |
| /** |
| * Class IntegrityHmacMD5 |
| * |
| * @author $Author$ |
| * @version $Revision$ |
| */ |
| public static class IntegrityHmacMD5 extends IntegrityHmac { |
| |
| /** |
| * Constructor IntegrityHmacMD5 |
| * |
| * @throws XMLSignatureException |
| */ |
| public IntegrityHmacMD5() throws XMLSignatureException { |
| super(); |
| } |
| |
| /** |
| * Method engineGetURI |
| * |
| * |
| */ |
| public String engineGetURI() { |
| return XMLSignature.ALGO_ID_MAC_HMAC_NOT_RECOMMENDED_MD5; |
| } |
| } |
| } |