| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.swssf.policy.assertionStates; |
| |
| import org.apache.ws.secpolicy.AssertionState; |
| import org.apache.ws.secpolicy.WSSPolicyException; |
| import org.apache.ws.secpolicy.model.AbstractSecurityAssertion; |
| import org.apache.ws.secpolicy.model.AlgorithmSuite; |
| import org.swssf.policy.Assertable; |
| import org.swssf.wss.ext.WSSConstants; |
| import org.apache.xml.security.stax.ext.XMLSecurityConstants; |
| import org.apache.xml.security.stax.securityEvent.AlgorithmSuiteSecurityEvent; |
| import org.apache.xml.security.stax.securityEvent.SecurityEvent; |
| import org.apache.xml.security.stax.securityEvent.SecurityEventConstants; |
| |
| /** |
| * WSP1.3, 6.1 Algorithm Suite Property |
| * |
| * @author $Author$ |
| * @version $Revision$ $Date$ |
| */ |
| public class AlgorithmSuiteAssertionState extends AssertionState implements Assertable { |
| |
| public AlgorithmSuiteAssertionState(AbstractSecurityAssertion assertion, boolean asserted) { |
| super(assertion, asserted); |
| } |
| |
| @Override |
| public SecurityEventConstants.Event[] getSecurityEventType() { |
| return new SecurityEventConstants.Event[]{ |
| SecurityEventConstants.AlgorithmSuite |
| }; |
| } |
| |
| @Override |
| public boolean assertEvent(SecurityEvent securityEvent) throws WSSPolicyException { |
| AlgorithmSuiteSecurityEvent algorithmSuiteSecurityEvent = (AlgorithmSuiteSecurityEvent) securityEvent; |
| AlgorithmSuite algorithmSuite = (AlgorithmSuite) getAssertion(); |
| |
| XMLSecurityConstants.KeyUsage keyUsage = algorithmSuiteSecurityEvent.getKeyUsage(); |
| if (WSSConstants.Sym_Sig.equals(keyUsage)) { |
| if (algorithmSuite.getSymmetricSignature() != null |
| && !algorithmSuite.getSymmetricSignature().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Symmetric signature algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength() |
| || algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) { |
| setAsserted(false); |
| setErrorMessage("Symmetric signature algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Asym_Sig.equals(keyUsage)) { |
| if (algorithmSuite.getAsymmetricSignature() != null |
| && !algorithmSuite.getAsymmetricSignature().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Asymmetric algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && (algorithmSuite.getAlgorithmSuiteType().getMinimumAsymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength() |
| || algorithmSuite.getAlgorithmSuiteType().getMaximumAsymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) { |
| setAsserted(false); |
| setErrorMessage("Asymmetric signature algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Dig.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getDigest().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Digest algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Enc.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getEncryption().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Encryption algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength() |
| || algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) { |
| setAsserted(false); |
| setErrorMessage("Symmetric encryption algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Sym_Key_Wrap.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getSymmetricKeyWrap().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Symmetric key wrap algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength() |
| || algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) { |
| setAsserted(false); |
| setErrorMessage("Symmetric key wrap algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Asym_Key_Wrap.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getAsymmetricKeyWrap().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Asymmetric key wrap algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && (algorithmSuite.getAlgorithmSuiteType().getMinimumAsymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength() |
| || algorithmSuite.getAlgorithmSuiteType().getMaximumAsymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) { |
| setAsserted(false); |
| setErrorMessage("Asymmetric key wrap algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Comp_Key.equals(keyUsage)) { |
| if (algorithmSuite.getComputedKey() != null |
| && !algorithmSuite.getComputedKey().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Computed key algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Enc_KD.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getEncryptionKeyDerivation().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Encryption key derivation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Sig_KD.equals(keyUsage)) { |
| if (algorithmSuite.getAlgorithmSuiteType() != null |
| && !algorithmSuite.getAlgorithmSuiteType().getSignatureKeyDerivation().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Signature key derivation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.C14n.equals(keyUsage)) { |
| if (algorithmSuite.getC14n() != null |
| && !algorithmSuite.getC14n().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("C14N algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.Soap_Norm.equals(keyUsage)) { |
| if (algorithmSuite.getSoapNormType() != null |
| && !algorithmSuite.getSoapNormType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("Soap normalization algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.STR_Trans.equals(keyUsage)) { |
| if (algorithmSuite.getStrType() != null |
| && !algorithmSuite.getStrType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("STR transformation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } else if (WSSConstants.XPath.equals(keyUsage)) { |
| if (algorithmSuite.getXPathType() != null |
| && !algorithmSuite.getXPathType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) { |
| setAsserted(false); |
| setErrorMessage("XPath algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy"); |
| } |
| } |
| return isAsserted(); |
| } |
| } |