001: /*
002: * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
003: *
004: * Copyright 1997-2007 Sun Microsystems, Inc. All rights reserved.
005: *
006: * The contents of this file are subject to the terms of either the GNU
007: * General Public License Version 2 only ("GPL") or the Common Development
008: * and Distribution License("CDDL") (collectively, the "License"). You
009: * may not use this file except in compliance with the License. You can obtain
010: * a copy of the License at https://glassfish.dev.java.net/public/CDDL+GPL.html
011: * or glassfish/bootstrap/legal/LICENSE.txt. See the License for the specific
012: * language governing permissions and limitations under the License.
013: *
014: * When distributing the software, include this License Header Notice in each
015: * file and include the License file at glassfish/bootstrap/legal/LICENSE.txt.
016: * Sun designates this particular file as subject to the "Classpath" exception
017: * as provided by Sun in the GPL Version 2 section of the License file that
018: * accompanied this code. If applicable, add the following below the License
019: * Header, with the fields enclosed by brackets [] replaced by your own
020: * identifying information: "Portions Copyrighted [year]
021: * [name of copyright owner]"
022: *
023: * Contributor(s):
024: *
025: * If you wish your version of this file to be governed by only the CDDL or
026: * only the GPL Version 2, indicate your decision by adding "[Contributor]
027: * elects to include this software in this distribution under the [CDDL or GPL
028: * Version 2] license." If you don't indicate a single choice of license, a
029: * recipient has the option to distribute your version of this file under
030: * either the CDDL, the GPL Version 2 or to extend the choice of license to
031: * its licensees as provided above. However, if you add GPL Version 2 code
032: * and therefore, elected the GPL Version 2 license, then the option applies
033: * only if the new code is made subject to such option by the copyright
034: * holder.
035: */
036:
037: package com.sun.xml.ws.security.impl.policy;
038:
039: import com.sun.xml.ws.policy.AssertionSet;
040: import com.sun.xml.ws.policy.NestedPolicy;
041: import com.sun.xml.ws.policy.PolicyAssertion;
042: import com.sun.xml.ws.policy.sourcemodel.AssertionData;
043: import com.sun.xml.ws.security.policy.AlgorithmSuite;
044: import com.sun.xml.ws.security.policy.MessageLayout;
045: import com.sun.xml.ws.security.policy.Token;
046: import com.sun.xml.ws.security.policy.SecurityAssertionValidator;
047: import java.util.Collection;
048: import java.util.Iterator;
049: import java.util.logging.Level;
050: import static com.sun.xml.ws.security.impl.policy.Constants.*;
051:
052: /**
053: *
054: *
055: *
056: * @author K.Venugopal@sun.com
057: *
058: */
059:
060: public class SymmetricBinding extends PolicyAssertion implements
061: com.sun.xml.ws.security.policy.SymmetricBinding,
062: SecurityAssertionValidator {
063:
064: private AssertionFitness fitness = AssertionFitness.IS_VALID;
065: boolean populated = false;
066: Token protectionToken;
067: Token signatureToken;
068: Token encryptionToken;
069: MessageLayout layout = MessageLayout.Lax;
070: AlgorithmSuite algSuite;
071: boolean includeTimestamp = false;
072: boolean disableTimestampSigning = false;
073: boolean contentOnly = true;
074: String protectionOrder = SIGN_ENCRYPT;
075: boolean protectToken = false;
076: boolean protectSignature = false;
077:
078: /**
079: *
080: * Creates a new instance of SymmetricBinding
081: *
082: */
083:
084: public SymmetricBinding() {
085: }
086:
087: public SymmetricBinding(AssertionData name,
088: Collection<PolicyAssertion> nestedAssertions,
089: AssertionSet nestedAlternative) {
090:
091: super (name, nestedAssertions, nestedAlternative);
092: }
093:
094: public Token getEncryptionToken() {
095: populate();
096: return encryptionToken;
097: }
098:
099: public Token getSignatureToken() {
100: populate();
101: return signatureToken;
102: }
103:
104: public Token getProtectionToken() {
105: populate();
106: return protectionToken;
107: }
108:
109: public void setAlgorithmSuite(AlgorithmSuite algSuite) {
110: this .algSuite = algSuite;
111: }
112:
113: public AlgorithmSuite getAlgorithmSuite() {
114: populate();
115: if (algSuite == null) {
116: algSuite = new com.sun.xml.ws.security.impl.policy.AlgorithmSuite();
117: logger.log(Level.FINE,
118: "Using Default Algorithm Suite Basic128");
119:
120: }
121: return algSuite;
122: }
123:
124: public void includeTimeStamp(boolean value) {
125: includeTimestamp = value;
126: }
127:
128: public boolean isIncludeTimeStamp() {
129: populate();
130: return includeTimestamp;
131: }
132:
133: public boolean isDisableTimestampSigning() {
134: populate();
135: return disableTimestampSigning;
136: }
137:
138: public void setLayout(MessageLayout layout) {
139: this .layout = layout;
140: }
141:
142: public MessageLayout getLayout() {
143: populate();
144: return layout;
145: }
146:
147: public void setEncryptionToken(Token token) {
148: encryptionToken = token;
149: }
150:
151: public void setSignatureToken(Token token) {
152: signatureToken = token;
153: }
154:
155: public void setProtectionToken(Token token) {
156: protectionToken = token;
157: }
158:
159: public boolean isSignContent() {
160: populate();
161: return contentOnly;
162: }
163:
164: public void setSignContent(boolean contentOnly) {
165:
166: this .contentOnly = contentOnly;
167: }
168:
169: public void setProtectionOrder(String order) {
170: this .protectionOrder = order;
171: }
172:
173: public String getProtectionOrder() {
174: populate();
175: return protectionOrder;
176: }
177:
178: public void setTokenProtection(boolean value) {
179: this .protectToken = value;
180: }
181:
182: public void setSignatureProtection(boolean value) {
183:
184: this .protectSignature = value;
185: }
186:
187: public boolean getTokenProtection() {
188: populate();
189: return protectToken;
190: }
191:
192: public boolean getSignatureProtection() {
193: populate();
194: return protectSignature;
195: }
196:
197: private void populate() {
198: populate(false);
199: }
200:
201: private synchronized AssertionFitness populate(boolean isServer) {
202: if (!populated) {
203: NestedPolicy policy = this .getNestedPolicy();
204: if (policy == null) {
205: if (logger.getLevel() == Level.FINE) {
206: logger.log(Level.FINE, "NestedPolicy is null");
207: }
208: populated = true;
209: return fitness;
210: }
211: AssertionSet as = policy.getAssertionSet();
212: Iterator<PolicyAssertion> ast = as.iterator();
213: while (ast.hasNext()) {
214: PolicyAssertion assertion = ast.next();
215: if (PolicyUtil.isSignatureToken(assertion)) {
216: this .signatureToken = ((com.sun.xml.ws.security.impl.policy.Token) assertion)
217: .getToken();
218: } else if (PolicyUtil.isEncryptionToken(assertion)) {
219: this .encryptionToken = ((com.sun.xml.ws.security.impl.policy.Token) assertion)
220: .getToken();
221: } else if (PolicyUtil.isProtectionToken(assertion)) {
222: this .protectionToken = ((com.sun.xml.ws.security.impl.policy.Token) assertion)
223: .getToken();
224: } else if (PolicyUtil.isAlgorithmAssertion(assertion)) {
225: this .algSuite = (AlgorithmSuite) assertion;
226: } else if (PolicyUtil.isIncludeTimestamp(assertion)) {
227: this .includeTimestamp = true;
228: } else if (PolicyUtil.isEncryptBeforeSign(assertion)) {
229: this .protectionOrder = ENCRYPT_SIGN;
230: } else if (PolicyUtil.isSignBeforeEncrypt(assertion)) {
231: this .protectionOrder = SIGN_ENCRYPT;
232: } else if (PolicyUtil.isContentOnlyAssertion(assertion)) {
233: this .contentOnly = false;
234: } else if (PolicyUtil.isMessageLayout(assertion)) {
235: layout = ((Layout) assertion).getMessageLayout();
236: } else if (PolicyUtil.isProtectTokens(assertion)) {
237: this .protectToken = true;
238: } else if (PolicyUtil.isEncryptSignature(assertion)) {
239: this .protectSignature = true;
240: } else if (PolicyUtil
241: .disableTimestampSigning(assertion)) {
242: this .disableTimestampSigning = true;
243: } else {
244: if (!assertion.isOptional()) {
245: log_invalid_assertion(assertion, isServer,
246: SymmetricBinding);
247: fitness = AssertionFitness.HAS_UNKNOWN_ASSERTION;
248: }
249: }
250: }
251: populated = true;
252: }
253: return fitness;
254: }
255:
256: public AssertionFitness validate(boolean isServer) {
257: return populate(isServer);
258: }
259: }
|