blob: 38ef0c49f980e622d1d5bba7d762918e14d3e043 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.wss4j.dom.message;
import org.apache.wss4j.common.util.SOAPUtil;
import org.apache.wss4j.dom.WSConstants;
import org.apache.wss4j.dom.WSDataRef;
import org.apache.wss4j.dom.common.CustomHandler;
import org.apache.wss4j.dom.common.KeystoreCallbackHandler;
import org.apache.wss4j.dom.engine.WSSConfig;
import org.apache.wss4j.dom.engine.WSSecurityEngine;
import org.apache.wss4j.dom.engine.WSSecurityEngineResult;
import org.apache.wss4j.dom.handler.HandlerAction;
import org.apache.wss4j.dom.handler.RequestData;
import org.apache.wss4j.dom.handler.WSHandlerConstants;
import org.apache.wss4j.dom.handler.WSHandlerResult;
import org.junit.jupiter.api.Test;
import org.apache.wss4j.common.WSEncryptionPart;
import org.apache.wss4j.common.crypto.Crypto;
import org.apache.wss4j.common.crypto.CryptoFactory;
import org.apache.wss4j.common.util.KeyUtils;
import org.apache.wss4j.common.util.XMLUtils;
import org.w3c.dom.Document;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.security.auth.callback.CallbackHandler;
import javax.xml.crypto.dsig.SignatureMethod;
import java.util.List;
import java.util.ArrayList;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertNotNull;
import static org.junit.jupiter.api.Assertions.assertNull;
import static org.junit.jupiter.api.Assertions.assertTrue;
/**
* A set of tests for combined signature/encryption, verification/decryption.
*/
public class SignatureEncryptionTest {
private static final org.slf4j.Logger LOG =
org.slf4j.LoggerFactory.getLogger(SignatureEncryptionTest.class);
private static final String SOAPMSG =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>"
+ "<SOAP-ENV:Envelope "
+ "xmlns:SOAP-ENV=\"http://schemas.xmlsoap.org/soap/envelope/\" "
+ "xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" "
+ "xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\">"
+ "<SOAP-ENV:Body>"
+ "<add xmlns=\"http://ws.apache.org/counter/counter_port_type\">"
+ "<value xmlns=\"http://blah.com\">15</value>"
+ "</add>"
+ "</SOAP-ENV:Body>"
+ "</SOAP-ENV:Envelope>";
public static final String SAMPLE_SOAP12_FAULT_MSG =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>"
+ "<s:Envelope "
+ "xmlns:s=\"http://www.w3.org/2003/05/soap-envelope\" "
+ "xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" "
+ "xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\">"
+ "<s:Body>"
+ "<Fault xmlns=\"http://www.w3.org/2003/05/soap-envelope\"><Code><Value>Receiver</Value></Code><Reason>"
+ "<Text xml:lang=\"en\">Error Message.</Text></Reason></Fault>"
+ "</s:Body>"
+ "</s:Envelope>";
private WSSecurityEngine secEngine = new WSSecurityEngine();
private CallbackHandler callbackHandler = new KeystoreCallbackHandler();
private Crypto crypto;
public SignatureEncryptionTest() throws Exception {
crypto = CryptoFactory.getInstance("wss40.properties");
WSSConfig.init();
}
/**
* Test that encrypts and then signs a WS-Security envelope, then performs
* verification and decryption <p/>
*
* @throws Exception
* Thrown when there is any problem in signing, encryption,
* decryption, or verification
*/
@Test
public void testEncryptionSigning() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
WSSecSignature sign = new WSSecSignature(secHeader);
encrypt.setUserInfo("wss40");
sign.setUserInfo("wss40", "security");
LOG.info("Before Encryption....");
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_128);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedDoc = encrypt.build(crypto, symmetricKey);
if (LOG.isDebugEnabled()) {
LOG.debug("After Encryption....");
String outputString =
XMLUtils.prettyDocumentToString(encryptedDoc);
LOG.debug(outputString);
}
Document encryptedSignedDoc = sign.build(crypto);
if (LOG.isDebugEnabled()) {
LOG.debug("After Signing....");
String outputString =
XMLUtils.prettyDocumentToString(encryptedSignedDoc);
LOG.debug(outputString);
}
verify(encryptedSignedDoc);
}
/**
* Test that encrypts and then signs a WS-Security envelope (including the
* encrypted element), then performs verification and decryption <p/>
*
* @throws Exception
* Thrown when there is any problem in signing, encryption,
* decryption, or verification
*/
@SuppressWarnings("unchecked")
@Test
public void testEncryptionElementSigning() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
WSSecSignature sign = new WSSecSignature(secHeader);
encrypt.setUserInfo("wss40");
sign.setUserInfo("wss40", "security");
LOG.info("Before Encryption....");
WSEncryptionPart part =
new WSEncryptionPart(
"add",
"http://ws.apache.org/counter/counter_port_type",
"Element");
encrypt.getParts().add(part);
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_128);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedDoc = encrypt.build(crypto, symmetricKey);
if (LOG.isDebugEnabled()) {
LOG.debug("After Encryption....");
String outputString =
XMLUtils.prettyDocumentToString(encryptedDoc);
LOG.debug(outputString);
}
WSEncryptionPart signPart =
new WSEncryptionPart(
WSConstants.ENC_DATA_LN,
WSConstants.ENC_NS,
"Element");
sign.getParts().add(signPart);
Document encryptedSignedDoc = sign.build(crypto);
if (LOG.isDebugEnabled()) {
LOG.debug("After Signing....");
String outputString =
XMLUtils.prettyDocumentToString(encryptedSignedDoc);
LOG.debug(outputString);
}
WSHandlerResult results = verify(encryptedSignedDoc);
List<WSSecurityEngineResult> sigSecEngResults =
results.getActionResults().get(WSConstants.SIGN);
List<WSSecurityEngineResult> encSecEngResults =
results.getActionResults().get(WSConstants.ENCR);
assertEquals(1, sigSecEngResults.size());
assertEquals(1, encSecEngResults.size());
List<WSDataRef> sigDataRefs =
(List<WSDataRef>)(sigSecEngResults.get(0)).get(
WSSecurityEngineResult.TAG_DATA_REF_URIS
);
List<WSDataRef> encDataRefs =
(List<WSDataRef>)(encSecEngResults.get(0)).get(
WSSecurityEngineResult.TAG_DATA_REF_URIS
);
assertNotNull(sigDataRefs);
assertNotNull(encDataRefs);
assertEquals(1, sigDataRefs.size());
assertEquals(1, encDataRefs.size());
assertNull(sigDataRefs.get(0)
.getProtectedElement().getAttributeNodeNS(WSConstants.WSU_NS, "Id"));
assertTrue(sigDataRefs.get(0).getWsuId().contains(
encDataRefs.get(0).getWsuId()));
}
/**
* Test that signs and then encrypts a WS-Security envelope, then performs
* decryption and verification <p/>
*
* @throws Exception
* Thrown when there is any problem in signing, encryption,
* decryption, or verification
*/
@Test
public void testSigningEncryption() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
WSSecSignature sign = new WSSecSignature(secHeader);
encrypt.setUserInfo("wss40");
sign.setUserInfo("wss40", "security");
LOG.info("Before Encryption....");
sign.build(crypto);
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_128);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedSignedDoc = encrypt.build(crypto, symmetricKey);
LOG.info("After Encryption....");
verify(encryptedSignedDoc);
}
/**
* Test that signs a SOAP Body, and then encrypts some data inside the SOAP Body.
* As the encryption adds a wsu:Id to the encrypted element, this test checks that
* verification still works ok.
*/
@Test
public void testWSS198() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
WSSecSignature sign = new WSSecSignature(secHeader);
encrypt.setUserInfo("wss40");
sign.setUserInfo("wss40", "security");
LOG.info("Before Encryption....");
WSEncryptionPart encP =
new WSEncryptionPart(
"add",
"http://ws.apache.org/counter/counter_port_type",
"");
encrypt.getParts().add(encP);
sign.build(crypto);
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_128);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedSignedDoc = encrypt.build(crypto, symmetricKey);
LOG.info("WSS198");
if (LOG.isDebugEnabled()) {
String outputString =
XMLUtils.prettyDocumentToString(encryptedSignedDoc);
LOG.debug(outputString);
}
verify(encryptedSignedDoc);
}
/**
* Test that first signs, then encrypts a WS-Security envelope.
* The test uses the IssuerSerial key identifier to get the keys for
* signature and encryption. Encryption uses 3DES.
* <p/>
*
* @throws Exception Thrown when there is any problem in signing, encryption,
* decryption, or verification
*/
@Test
public void testSigningEncryptionIS3DES() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
encrypt.setUserInfo("wss40");
encrypt.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
encrypt.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
WSSecSignature sign = new WSSecSignature(secHeader);
sign.setUserInfo("wss40", "security");
sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
LOG.info("Before Sign/Encryption....");
sign.build(crypto);
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.TRIPLE_DES);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedSignedDoc = encrypt.build(crypto, symmetricKey);
if (LOG.isDebugEnabled()) {
LOG.debug("Signed and encrypted message with IssuerSerial key identifier (both), 3DES:");
String outputString =
XMLUtils.prettyDocumentToString(encryptedSignedDoc);
LOG.debug(outputString);
}
LOG.info("After Sign/Encryption....");
verify(encryptedSignedDoc);
}
/**
* Test signature created using an encrypted key
* SOAP Body is signed and encrypted. In the encryption, The ReferenceList element is
* put into the Encrypted Key, as a child of the EncryptedKey. Signature is created
* using the encrypted key.
*/
@Test
public void testEncryptedKeySignature() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPMSG);
LOG.info("Before Sign/Encryption....");
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncryptedKey encrKey = new WSSecEncryptedKey(secHeader);
encrKey.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
encrKey.setUserInfo("wss40", "security");
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_192);
SecretKey symmetricKey = keyGen.generateKey();
encrKey.prepare(crypto, symmetricKey);
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
encrypt.setEncKeyId(encrKey.getId());
encrypt.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
encrypt.setEncryptSymmKey(false);
encrypt.setEncryptedKeyElement(encrKey.getEncryptedKeyElement());
WSSecSignature sign = new WSSecSignature(secHeader);
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sign.setCustomTokenId(encrKey.getId());
sign.setSecretKey(symmetricKey.getEncoded());
sign.setCustomTokenValueType(WSConstants.WSS_ENC_KEY_VALUE_TYPE);
sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1);
sign.build(crypto);
Document encryptedSignedDoc = encrypt.build(crypto, symmetricKey);
if (LOG.isDebugEnabled()) {
LOG.debug("Signed and encrypted message with IssuerSerial key identifier (both), 3DES:");
String outputString =
XMLUtils.prettyDocumentToString(encryptedSignedDoc);
LOG.debug(outputString);
}
LOG.info("After Sign/Encryption....");
verify(encryptedSignedDoc);
}
@Test
public void testEncryptionSigningHandler() throws Exception {
final WSSConfig cfg = WSSConfig.getNewInstance();
final RequestData reqData = new RequestData();
reqData.setWssConfig(cfg);
java.util.Map<String, Object> messageContext = new java.util.TreeMap<>();
messageContext.put(WSHandlerConstants.PW_CALLBACK_REF, new KeystoreCallbackHandler());
messageContext.put(WSHandlerConstants.ENC_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put(WSHandlerConstants.SIG_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put("" + crypto.hashCode(), crypto);
reqData.setMsgContext(messageContext);
reqData.setUsername("wss40");
final Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
CustomHandler handler = new CustomHandler();
List<HandlerAction> handlerActions = new ArrayList<>();
HandlerAction action = new HandlerAction(WSConstants.ENCR);
handlerActions.add(action);
action = new HandlerAction(WSConstants.SIGN);
handlerActions.add(action);
handler.send(
doc,
reqData,
handlerActions,
true
);
String outputString =
XMLUtils.prettyDocumentToString(doc);
if (LOG.isDebugEnabled()) {
LOG.debug(outputString);
}
List<Integer> receivingActions = new ArrayList<>();
receivingActions.add(WSConstants.ENCR);
receivingActions.add(WSConstants.SIGN);
messageContext.put(WSHandlerConstants.DEC_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put(WSHandlerConstants.SIG_VER_PROP_REF_ID, "" + crypto.hashCode());
handler.receive(receivingActions, reqData);
WSSecurityEngine newEngine = new WSSecurityEngine();
newEngine.processSecurityHeader(doc, reqData);
}
@Test
public void testSigningEncryptionHandler() throws Exception {
final WSSConfig cfg = WSSConfig.getNewInstance();
final RequestData reqData = new RequestData();
reqData.setWssConfig(cfg);
java.util.Map<String, Object> messageContext = new java.util.TreeMap<>();
messageContext.put(WSHandlerConstants.PW_CALLBACK_REF, new KeystoreCallbackHandler());
messageContext.put(WSHandlerConstants.ENC_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put(WSHandlerConstants.SIG_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put("" + crypto.hashCode(), crypto);
reqData.setMsgContext(messageContext);
reqData.setUsername("wss40");
final Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
CustomHandler handler = new CustomHandler();
List<HandlerAction> handlerActions = new ArrayList<>();
HandlerAction action = new HandlerAction(WSConstants.SIGN);
handlerActions.add(action);
action = new HandlerAction(WSConstants.ENCR);
handlerActions.add(action);
handler.send(
doc,
reqData,
handlerActions,
true
);
String outputString =
XMLUtils.prettyDocumentToString(doc);
if (LOG.isDebugEnabled()) {
LOG.debug(outputString);
}
List<Integer> receivingActions = new ArrayList<>();
receivingActions.add(WSConstants.SIGN);
receivingActions.add(WSConstants.ENCR);
messageContext.put(WSHandlerConstants.DEC_PROP_REF_ID, "" + crypto.hashCode());
messageContext.put(WSHandlerConstants.SIG_VER_PROP_REF_ID, "" + crypto.hashCode());
handler.receive(receivingActions, reqData);
WSSecurityEngine newEngine = new WSSecurityEngine();
newEngine.processSecurityHeader(doc, reqData);
}
@Test
public void testSigningEncryptionSOAP12Fault() throws Exception {
Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
WSSecHeader secHeader = new WSSecHeader(doc);
secHeader.insertSecurityHeader();
WSSecEncrypt encrypt = new WSSecEncrypt(secHeader);
WSSecSignature sign = new WSSecSignature(secHeader);
encrypt.setUserInfo("wss40");
sign.setUserInfo("wss40", "security");
LOG.info("Before Encryption....");
sign.build(crypto);
KeyGenerator keyGen = KeyUtils.getKeyGenerator(WSConstants.AES_128);
SecretKey symmetricKey = keyGen.generateKey();
Document encryptedSignedDoc = encrypt.build(crypto, symmetricKey);
LOG.info("After Encryption....");
verify(encryptedSignedDoc);
}
/**
* Verifies the soap envelope <p/>
*
* @param envelope
*
* @return the <code>WSSecurityEngineResult</code>s from processing
*
* @throws Exception
* Thrown when there is a problem in verification
*/
private WSHandlerResult verify(Document doc) throws Exception {
WSHandlerResult resultList =
secEngine.processSecurityHeader(doc, null, callbackHandler, crypto);
if (LOG.isDebugEnabled()) {
String outputString =
XMLUtils.prettyDocumentToString(doc);
LOG.debug(outputString);
}
return resultList;
}
}