/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.wss4j.stax.impl.processor.output; import java.nio.charset.StandardCharsets; import java.security.Key; import java.security.cert.X509Certificate; import java.util.ArrayList; import java.util.List; import javax.crypto.spec.SecretKeySpec; import javax.xml.namespace.QName; import javax.xml.stream.XMLStreamException; import org.apache.commons.codec.binary.Base64; import org.apache.wss4j.common.derivedKey.AlgoFactory; import org.apache.wss4j.common.derivedKey.DerivationAlgorithm; import org.apache.wss4j.common.ext.WSPasswordCallback; import org.apache.wss4j.common.ext.WSSecurityException; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; import org.apache.wss4j.stax.utils.WSSUtils; import org.apache.xml.security.exceptions.XMLSecurityException; import org.apache.xml.security.stax.config.JCEAlgorithmMapper; import org.apache.xml.security.stax.ext.AbstractOutputProcessor; import org.apache.xml.security.stax.ext.OutputProcessorChain; import org.apache.xml.security.stax.ext.XMLSecurityConstants; import org.apache.xml.security.stax.ext.stax.XMLSecAttribute; import org.apache.xml.security.stax.ext.stax.XMLSecEvent; import org.apache.xml.security.stax.impl.securityToken.GenericOutboundSecurityToken; import org.apache.xml.security.stax.impl.util.IDGenerator; import org.apache.xml.security.stax.securityToken.OutboundSecurityToken; import org.apache.xml.security.stax.securityToken.SecurityToken; import org.apache.xml.security.stax.securityToken.SecurityTokenProvider; public class DerivedKeyTokenOutputProcessor extends AbstractOutputProcessor { public DerivedKeyTokenOutputProcessor() throws XMLSecurityException { super(); } @Override public void processEvent(XMLSecEvent xmlSecEvent, OutputProcessorChain outputProcessorChain) throws XMLStreamException, XMLSecurityException { try { String tokenId = outputProcessorChain.getSecurityContext().get(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_DERIVED_KEY); if (tokenId == null) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE); } SecurityTokenProvider<OutboundSecurityToken> wrappingSecurityTokenProvider = outputProcessorChain.getSecurityContext().getSecurityTokenProvider(tokenId); if (wrappingSecurityTokenProvider == null) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE); } final OutboundSecurityToken wrappingSecurityToken = wrappingSecurityTokenProvider.getSecurityToken(); if (wrappingSecurityToken == null) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE); } final String wsuIdDKT = IDGenerator.generateID(null); int offset = 0; int length = 0; XMLSecurityConstants.Action action = getAction(); if (WSSConstants.SIGNATURE_WITH_DERIVED_KEY.equals(action)) { if (((WSSSecurityProperties)getSecurityProperties()).getDerivedSignatureKeyLength() > 0) { length = ((WSSSecurityProperties)getSecurityProperties()).getDerivedSignatureKeyLength(); } else { length = JCEAlgorithmMapper.getKeyLengthFromURI(getSecurityProperties().getSignatureAlgorithm()) / 8; } } else if (WSSConstants.ENCRYPT_WITH_DERIVED_KEY.equals(action)) { if (((WSSSecurityProperties)getSecurityProperties()).getDerivedEncryptionKeyLength() > 0) { length = ((WSSSecurityProperties)getSecurityProperties()).getDerivedEncryptionKeyLength(); } else { length = JCEAlgorithmMapper.getKeyLengthFromURI(getSecurityProperties().getEncryptionSymAlgorithm()) / 8; } } String defaultLabel = WSSConstants.WS_SEC_CONV_DEFAULT_LABEL + WSSConstants.WS_SEC_CONV_DEFAULT_LABEL; byte[] label = defaultLabel.getBytes(StandardCharsets.UTF_8); byte[] nonce = WSSConstants.generateBytes(16); byte[] seed = new byte[label.length + nonce.length]; System.arraycopy(label, 0, seed, 0, label.length); System.arraycopy(nonce, 0, seed, label.length, nonce.length); DerivationAlgorithm derivationAlgorithm = AlgoFactory.getInstance(WSSConstants.P_SHA_1); byte[] secret; if (WSSecurityTokenConstants.SECURITY_CONTEXT_TOKEN.equals(wrappingSecurityToken.getTokenType())) { WSPasswordCallback passwordCallback = new WSPasswordCallback(wsuIdDKT, WSPasswordCallback.SECRET_KEY); WSSUtils.doSecretKeyCallback(((WSSSecurityProperties)securityProperties).getCallbackHandler(), passwordCallback, wsuIdDKT); if (passwordCallback.getKey() == null) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, "noKey", new Object[] {wsuIdDKT}); } secret = passwordCallback.getKey(); } else { secret = wrappingSecurityToken.getSecretKey("").getEncoded(); } final byte[] derivedKeyBytes = derivationAlgorithm.createKey(secret, seed, offset, length); final GenericOutboundSecurityToken derivedKeySecurityToken = new GenericOutboundSecurityToken(wsuIdDKT, WSSecurityTokenConstants.DerivedKeyToken) { @Override public Key getSecretKey(String algorithmURI) throws WSSecurityException { Key key = null; try { key = super.getSecretKey(algorithmURI); } catch (XMLSecurityException e) { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, e); } if (key != null) { return key; } String algoFamily = JCEAlgorithmMapper.getJCEKeyAlgorithmFromURI(algorithmURI); key = new SecretKeySpec(derivedKeyBytes, algoFamily); setSecretKey(algorithmURI, key); return key; } }; derivedKeySecurityToken.setKeyWrappingToken(wrappingSecurityToken); wrappingSecurityToken.addWrappedToken(derivedKeySecurityToken); SecurityTokenProvider<OutboundSecurityToken> derivedKeysecurityTokenProvider = new SecurityTokenProvider<OutboundSecurityToken>() { @Override public OutboundSecurityToken getSecurityToken() throws WSSecurityException { return derivedKeySecurityToken; } @Override public String getId() { return wsuIdDKT; } }; if (WSSConstants.SIGNATURE_WITH_DERIVED_KEY.equals(action)) { outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_SIGNATURE, wsuIdDKT); } else if (WSSConstants.ENCRYPT_WITH_DERIVED_KEY.equals(action)) { outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_ENCRYPTION, wsuIdDKT); } outputProcessorChain.getSecurityContext().registerSecurityTokenProvider(wsuIdDKT, derivedKeysecurityTokenProvider); FinalDerivedKeyTokenOutputProcessor finalDerivedKeyTokenOutputProcessor = new FinalDerivedKeyTokenOutputProcessor(derivedKeySecurityToken, offset, length, new String(Base64.encodeBase64(nonce)), ((WSSSecurityProperties)getSecurityProperties()).isUse200512Namespace(), wrappingSecurityToken.getSha1Identifier()); finalDerivedKeyTokenOutputProcessor.setXMLSecurityProperties(getSecurityProperties()); finalDerivedKeyTokenOutputProcessor.setAction(getAction()); if (wrappingSecurityToken.getProcessor() != null) { finalDerivedKeyTokenOutputProcessor.addBeforeProcessor(wrappingSecurityToken.getProcessor()); } else { finalDerivedKeyTokenOutputProcessor.addAfterProcessor(ReferenceListOutputProcessor.class.getName()); } finalDerivedKeyTokenOutputProcessor.init(outputProcessorChain); derivedKeySecurityToken.setProcessor(finalDerivedKeyTokenOutputProcessor); } finally { outputProcessorChain.removeProcessor(this); } outputProcessorChain.processEvent(xmlSecEvent); } static class FinalDerivedKeyTokenOutputProcessor extends AbstractOutputProcessor { private final OutboundSecurityToken securityToken; private final int offset; private final int length; private final String nonce; private final boolean use200512Namespace; private final String sha1Identifier; FinalDerivedKeyTokenOutputProcessor(OutboundSecurityToken securityToken, int offset, int length, String nonce, boolean use200512Namespace, String sha1Identifier) throws XMLSecurityException { super(); this.securityToken = securityToken; this.offset = offset; this.length = length; this.nonce = nonce; this.use200512Namespace = use200512Namespace; this.sha1Identifier = sha1Identifier; } @Override public void processEvent(XMLSecEvent xmlSecEvent, OutputProcessorChain outputProcessorChain) throws XMLStreamException, XMLSecurityException { outputProcessorChain.processEvent(xmlSecEvent); if (WSSUtils.isSecurityHeaderElement(xmlSecEvent, ((WSSSecurityProperties) getSecurityProperties()).getActor())) { final QName headerElementName = getHeaderElementName(); OutputProcessorUtils.updateSecurityHeaderOrder(outputProcessorChain, headerElementName, getAction(), false); OutputProcessorChain subOutputProcessorChain = outputProcessorChain.createSubChain(this); List<XMLSecAttribute> attributes = new ArrayList<>(1); attributes.add(createAttribute(WSSConstants.ATT_WSU_ID, securityToken.getId())); createStartElementAndOutputAsEvent(subOutputProcessorChain, headerElementName, true, attributes); createSecurityTokenReferenceStructureForDerivedKey(subOutputProcessorChain, securityToken, ((WSSSecurityProperties) getSecurityProperties()).getDerivedKeyKeyIdentifier(), ((WSSSecurityProperties) getSecurityProperties()).getDerivedKeyTokenReference(), getSecurityProperties().isUseSingleCert()); createStartElementAndOutputAsEvent(subOutputProcessorChain, getOffsetName(), false, null); createCharactersAndOutputAsEvent(subOutputProcessorChain, "" + offset); createEndElementAndOutputAsEvent(subOutputProcessorChain, getOffsetName()); createStartElementAndOutputAsEvent(subOutputProcessorChain, getLengthName(), false, null); createCharactersAndOutputAsEvent(subOutputProcessorChain, "" + length); createEndElementAndOutputAsEvent(subOutputProcessorChain, getLengthName()); createStartElementAndOutputAsEvent(subOutputProcessorChain, getNonceName(), false, null); createCharactersAndOutputAsEvent(subOutputProcessorChain, nonce); createEndElementAndOutputAsEvent(subOutputProcessorChain, getNonceName()); createEndElementAndOutputAsEvent(subOutputProcessorChain, headerElementName); outputProcessorChain.removeProcessor(this); } } protected void createSecurityTokenReferenceStructureForDerivedKey( OutputProcessorChain outputProcessorChain, OutboundSecurityToken securityToken, WSSecurityTokenConstants.KeyIdentifier keyIdentifier, WSSConstants.DerivedKeyTokenReference derivedKeyTokenReference, boolean useSingleCertificate) throws XMLStreamException, XMLSecurityException { SecurityToken wrappingToken = securityToken.getKeyWrappingToken(); List<XMLSecAttribute> attributes = new ArrayList<>(2); attributes.add(createAttribute(WSSConstants.ATT_WSU_ID, IDGenerator.generateID(null))); if (WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE.equals(keyIdentifier) && !useSingleCertificate) { attributes.add(createAttribute(WSSConstants.ATT_WSSE11_TOKEN_TYPE, WSSConstants.NS_X509_PKIPATH_V1)); } else if (derivedKeyTokenReference == WSSConstants.DerivedKeyTokenReference.EncryptedKey || WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER.equals(keyIdentifier)) { attributes.add(createAttribute(WSSConstants.ATT_WSSE11_TOKEN_TYPE, WSSConstants.NS_WSS_ENC_KEY_VALUE_TYPE)); } else if (WSSecurityTokenConstants.KERBEROS_TOKEN.equals(wrappingToken.getTokenType())) { attributes.add(createAttribute(WSSConstants.ATT_WSSE11_TOKEN_TYPE, WSSConstants.NS_GSS_KERBEROS5_AP_REQ)); } createStartElementAndOutputAsEvent(outputProcessorChain, WSSConstants.TAG_WSSE_SECURITY_TOKEN_REFERENCE, false, attributes); X509Certificate[] x509Certificates = wrappingToken.getX509Certificates(); String tokenId = wrappingToken.getId(); if (derivedKeyTokenReference == WSSConstants.DerivedKeyTokenReference.EncryptedKey) { String valueType = WSSConstants.NS_WSS_ENC_KEY_VALUE_TYPE; WSSUtils.createBSTReferenceStructure(this, outputProcessorChain, tokenId, valueType, true); } else if (WSSecurityTokenConstants.KeyIdentifier_IssuerSerial.equals(keyIdentifier)) { WSSUtils.createX509IssuerSerialStructure(this, outputProcessorChain, x509Certificates); } else if (WSSecurityTokenConstants.KeyIdentifier_SkiKeyIdentifier.equals(keyIdentifier)) { WSSUtils.createX509SubjectKeyIdentifierStructure(this, outputProcessorChain, x509Certificates); } else if (WSSecurityTokenConstants.KeyIdentifier_X509KeyIdentifier.equals(keyIdentifier)) { WSSUtils.createX509KeyIdentifierStructure(this, outputProcessorChain, x509Certificates); } else if (WSSecurityTokenConstants.KEYIDENTIFIER_KERBEROS_SHA1_IDENTIFIER.equals(keyIdentifier)) { String identifier = wrappingToken.getSha1Identifier(); WSSUtils.createKerberosSha1IdentifierStructure(this, outputProcessorChain, identifier); } else if (WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER.equals(keyIdentifier)) { WSSUtils.createThumbprintKeyIdentifierStructure(this, outputProcessorChain, x509Certificates); } else if (WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE.equals(keyIdentifier)) { String valueType; if (WSSecurityTokenConstants.KERBEROS_TOKEN.equals(wrappingToken.getTokenType())) { valueType = WSSConstants.NS_GSS_KERBEROS5_AP_REQ; } else if (WSSecurityTokenConstants.SPNEGO_CONTEXT_TOKEN.equals(wrappingToken.getTokenType()) || WSSecurityTokenConstants.SECURITY_CONTEXT_TOKEN.equals(wrappingToken.getTokenType()) || WSSecurityTokenConstants.SECURE_CONVERSATION_TOKEN.equals(wrappingToken.getTokenType())) { boolean use200512Namespace = ((WSSSecurityProperties)getSecurityProperties()).isUse200512Namespace(); if (use200512Namespace) { valueType = WSSConstants.NS_WSC_05_12 + "/sct"; } else { valueType = WSSConstants.NS_WSC_05_02 + "/sct"; } } else if (useSingleCertificate) { valueType = WSSConstants.NS_X509_V3_TYPE; } else { valueType = WSSConstants.NS_X509_PKIPATH_V1; } boolean included = ((WSSSecurityProperties)getSecurityProperties()).isIncludeSignatureToken(); WSSUtils.createBSTReferenceStructure(this, outputProcessorChain, tokenId, valueType, included); } else if (WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER.equals(keyIdentifier)) { WSSUtils.createEncryptedKeySha1IdentifierStructure(this, outputProcessorChain, sha1Identifier); } else { throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, "unsupportedSecurityToken"); } createEndElementAndOutputAsEvent(outputProcessorChain, WSSConstants.TAG_WSSE_SECURITY_TOKEN_REFERENCE); } private QName getHeaderElementName() { if (use200512Namespace) { return WSSConstants.TAG_WSC0512_DKT; } return WSSConstants.TAG_WSC0502_DKT; } private QName getOffsetName() { if (use200512Namespace) { return WSSConstants.TAG_WSC0512_OFFSET; } return WSSConstants.TAG_WSC0502_OFFSET; } private QName getLengthName() { if (use200512Namespace) { return WSSConstants.TAG_WSC0512_LENGTH; } return WSSConstants.TAG_WSC0502_LENGTH; } private QName getNonceName() { if (use200512Namespace) { return WSSConstants.TAG_WSC0512_NONCE; } return WSSConstants.TAG_WSC0502_NONCE; } } }