280 lines
9.9 KiB
C
280 lines
9.9 KiB
C
/* $Id$
|
|
*
|
|
* Lasso - A free implementation of the Liberty Alliance specifications.
|
|
*
|
|
* Copyright (C) 2004-2007 Entr'ouvert
|
|
* http://lasso.entrouvert.org
|
|
*
|
|
* Authors: See AUTHORS file in top-level directory.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#ifndef __LASSO_XML_PRIVATE_H__
|
|
#define __LASSO_XML_PRIVATE_H__
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif /* __cplusplus */
|
|
|
|
#include "xml.h"
|
|
#include "xml_enc.h"
|
|
#include <xmlsec/crypto.h>
|
|
#include <xmlsec/xmlenc.h>
|
|
#include "saml-2.0/saml2_encrypted_element.h"
|
|
#include "../utils.h"
|
|
|
|
typedef enum {
|
|
SNIPPET_NODE,
|
|
SNIPPET_CONTENT,
|
|
SNIPPET_TEXT_CHILD,
|
|
SNIPPET_NAME_IDENTIFIER,
|
|
SNIPPET_ATTRIBUTE,
|
|
SNIPPET_NODE_IN_CHILD,
|
|
SNIPPET_LIST_NODES,
|
|
SNIPPET_LIST_CONTENT,
|
|
SNIPPET_EXTENSION,
|
|
SNIPPET_SIGNATURE,
|
|
SNIPPET_LIST_XMLNODES,
|
|
SNIPPET_XMLNODE,
|
|
SNIPPET_COLLECT_NAMESPACES,
|
|
|
|
/* transformers for content transformation */
|
|
SNIPPET_STRING = 1 << 0, /* default, can be omitted */
|
|
SNIPPET_BOOLEAN = 1 << 20,
|
|
SNIPPET_INTEGER = 1 << 21,
|
|
SNIPPET_LASSO_DUMP = 1 << 22,
|
|
SNIPPET_OPTIONAL = 1 << 23, /* optional, ignored if 0 */
|
|
SNIPPET_OPTIONAL_NEG = 1 << 24, /* optional, ignored if -1 */
|
|
SNIPPET_ANY = 1 << 25, /* ##any node */
|
|
SNIPPET_ALLOW_TEXT = 1 << 26, /* allow text childs in list of nodes */
|
|
SNIPPET_KEEP_XMLNODE = 1 << 27, /* force keep xmlNode */
|
|
SNIPPET_PRIVATE = 1 << 28, /* means that the offset is relative to a private extension */
|
|
} SnippetType;
|
|
|
|
typedef enum {
|
|
NO_OPTION = 0,
|
|
NO_SINGLE_REFERENCE = 1 /* SAML signature should contain a single reference,
|
|
* but WS-Security signatures can contain many */,
|
|
EMPTY_URI = 2,
|
|
} SignatureVerificationOption;
|
|
|
|
struct XmlSnippet {
|
|
char *name;
|
|
SnippetType type;
|
|
guint offset;
|
|
char *class_name;
|
|
char *ns_name;
|
|
char *ns_uri;
|
|
};
|
|
|
|
/**
|
|
* LassoSignatureContext:
|
|
* @signature_method: the method for signing (RSA, DSA, HMAC)
|
|
* @signature_key: a key for the signature
|
|
*
|
|
* Information needed to make a signature
|
|
*/
|
|
typedef struct _LassoSignatureContext {
|
|
LassoSignatureMethod signature_method;
|
|
xmlSecKey *signature_key;
|
|
} LassoSignatureContext;
|
|
|
|
#define LASSO_SIGNATURE_CONTEXT_NONE ((LassoSignatureContext){LASSO_SIGNATURE_TYPE_NONE, NULL})
|
|
|
|
#define lasso_assign_signature_context(to, from) \
|
|
do { \
|
|
LassoSignatureContext *__to = &(to); \
|
|
LassoSignatureContext __from = (from); \
|
|
__to->signature_method = __from.signature_method; \
|
|
lasso_assign_sec_key(__to->signature_key, __from.signature_key); \
|
|
} while(0)
|
|
|
|
#define lasso_assign_new_signature_context(to, from) \
|
|
do { \
|
|
LassoSignatureContext *__to = &(to); \
|
|
LassoSignatureContext __from = (from); \
|
|
__to->signature_method = __from.signature_method; \
|
|
lasso_assign_new_sec_key(__to->signature_key, __from.signature_key); \
|
|
} while(0)
|
|
|
|
static inline gboolean
|
|
lasso_validate_signature_context(LassoSignatureContext context) {
|
|
return lasso_validate_signature_method(context.signature_method)
|
|
&& context.signature_key != NULL;
|
|
}
|
|
|
|
/**
|
|
* This inline method replace normal use of G_STRUCT_MEMBER_P/G_STRUCT_MEMBER, in order to add an
|
|
* indirection through the private structure attached to a GObject instance if needed */
|
|
inline static void *
|
|
snippet_struct_member(void *base, GType type, struct XmlSnippet *snippet)
|
|
{
|
|
if (snippet->type & SNIPPET_PRIVATE) {
|
|
if (! G_IS_OBJECT(base))
|
|
return NULL;
|
|
GObject *object = (GObject*)base;
|
|
base = g_type_instance_get_private((GTypeInstance*)object,
|
|
type);
|
|
}
|
|
return G_STRUCT_MEMBER_P(base, snippet->offset);
|
|
}
|
|
|
|
#define SNIPPET_STRUCT_MEMBER(type, base, gtype, snippet) \
|
|
(*(type*)snippet_struct_member(base, gtype, snippet))
|
|
|
|
#define SNIPPET_STRUCT_MEMBER_P(base, gtype, snippet) \
|
|
snippet_struct_member(base, gtype, snippet)
|
|
|
|
struct QuerySnippet {
|
|
char *path;
|
|
char *field_name;
|
|
};
|
|
|
|
struct _LassoNodeClassData
|
|
{
|
|
struct XmlSnippet *snippets;
|
|
struct QuerySnippet *query_snippets;
|
|
char *node_name;
|
|
xmlNs *ns;
|
|
char *id_attribute_name;
|
|
int id_attribute_offset;
|
|
int sign_type_offset;
|
|
int sign_method_offset;
|
|
int private_key_file_offset;
|
|
int certificate_file_offset;
|
|
gboolean keep_xmlnode;
|
|
};
|
|
|
|
void lasso_node_class_set_nodename(LassoNodeClass *klass, char *name);
|
|
void lasso_node_class_set_ns(LassoNodeClass *klass, char *href, char *prefix);
|
|
void lasso_node_class_add_snippets(LassoNodeClass *klass, struct XmlSnippet *snippets);
|
|
void lasso_node_class_add_query_snippets(LassoNodeClass *klass, struct QuerySnippet *snippets);
|
|
|
|
gchar* lasso_node_build_query_from_snippets(LassoNode *node);
|
|
gboolean lasso_node_init_from_query_fields(LassoNode *node, char **query_fields);
|
|
gboolean lasso_node_init_from_saml2_query_fields(LassoNode *node,
|
|
char **query_fields, char **relay_state);
|
|
LassoMessageFormat lasso_node_init_from_message_with_format(LassoNode *node, const char *message, LassoMessageFormat constraint, xmlDoc **doc_out, xmlNode **root_out);
|
|
|
|
typedef enum {
|
|
LASSO_PEM_FILE_TYPE_UNKNOWN,
|
|
LASSO_PEM_FILE_TYPE_PUB_KEY,
|
|
LASSO_PEM_FILE_TYPE_PRIVATE_KEY,
|
|
LASSO_PEM_FILE_TYPE_CERT
|
|
} LassoPemFileType;
|
|
|
|
void lasso_build_random_sequence(char *buffer, unsigned int size);
|
|
char* lasso_build_unique_id(unsigned int size);
|
|
char* lasso_get_current_time(void);
|
|
char* lasso_time_to_iso_8601_gmt(time_t now);
|
|
time_t lasso_iso_8601_gmt_to_time_t(const char *xsdtime);
|
|
LassoPemFileType lasso_get_pem_file_type(const char *file);
|
|
|
|
xmlSecKeyPtr lasso_get_public_key_from_pem_file(const char *file);
|
|
xmlSecKeyPtr lasso_get_public_key_from_pem_cert_file(const char *file);
|
|
xmlSecKeysMngr* lasso_load_certs_from_pem_certs_chain_file (const char *file);
|
|
|
|
char* lasso_query_sign(char *query, LassoSignatureContext signature_context);
|
|
|
|
int lasso_query_verify_signature(const char *query, const xmlSecKey *public_key);
|
|
|
|
int lasso_saml2_query_verify_signature(const char *query, const xmlSecKey *sender_public_key);
|
|
|
|
char* lasso_sha1(const char *str);
|
|
|
|
char** urlencoded_to_strings(const char *str);
|
|
|
|
int lasso_sign_node(xmlNode *xmlnode, LassoSignatureContext context, const char *id_attr_name, const char *id_value);
|
|
|
|
int lasso_verify_signature(xmlNode *signed_node, xmlDoc *doc, const char *id_attr_name,
|
|
xmlSecKeysMngr *keys_manager, xmlSecKey *public_key,
|
|
SignatureVerificationOption signature_verification_option,
|
|
GList **uri_references);
|
|
void xmlCleanNs(xmlNode *root_node);
|
|
|
|
void xml_insure_namespace(xmlNode *xmlnode, xmlNs *ns, gboolean force,
|
|
gchar *ns_href, gchar *ns_prefix);
|
|
|
|
gchar* lasso_node_build_deflated_query(LassoNode *node);
|
|
|
|
gchar* lasso_node_build_query(LassoNode *node);
|
|
|
|
gboolean lasso_node_init_from_deflated_query_part(LassoNode *node, char *deflate_string);
|
|
|
|
xmlNode* lasso_node_get_xmlnode_for_any_type(LassoNode *node, xmlNode *cur);
|
|
|
|
LassoSaml2EncryptedElement* lasso_node_encrypt(LassoNode *lasso_node,
|
|
xmlSecKey *encryption_public_key, LassoEncryptionSymKeyType encryption_sym_key_type, const char *recipient);
|
|
|
|
int lasso_node_decrypt_xmlnode(xmlNode* encrypted_element, GList *encrypted_key,
|
|
xmlSecKey *encryption_private_key, LassoNode **output);
|
|
|
|
void lasso_node_remove_signature(LassoNode *node);
|
|
|
|
char* lasso_concat_url_query(const char *url, const char *query);
|
|
|
|
xmlDocPtr lasso_xml_parse_memory(const char *buffer, int size);
|
|
|
|
xmlNode* lasso_xml_get_soap_content(xmlNode *root);
|
|
|
|
gboolean lasso_xml_is_soap(xmlNode *root);
|
|
|
|
gboolean lasso_eval_xpath_expression(xmlXPathContextPtr xpath_ctx, const char *expression,
|
|
xmlXPathObjectPtr *xpath_object_ptr, int *xpath_error_code);
|
|
|
|
#define IF_SAML2(profile) \
|
|
if (lasso_provider_get_protocol_conformance(LASSO_PROVIDER(profile->server)) == \
|
|
LASSO_PROTOCOL_SAML_2_0)
|
|
|
|
char * lasso_get_relaystate_from_query(const char *query);
|
|
char * lasso_url_add_parameters(char *url, gboolean free, ...);
|
|
xmlSecKey* lasso_xmlsec_load_private_key_from_buffer(const char *buffer, size_t length, const char *password, LassoSignatureMethod signature_method, const char *certificate);
|
|
xmlSecKey* lasso_xmlsec_load_private_key(const char *filename_or_buffer, const char *password,
|
|
LassoSignatureMethod signature_method, const char *certificate);
|
|
xmlDocPtr lasso_xml_parse_file(const char *filepath);
|
|
xmlDocPtr lasso_xml_parse_memory_with_error(const char *buffer, int size, xmlError *error);
|
|
xmlSecKeyPtr lasso_xmlsec_load_key_info(xmlNode *key_descriptor);
|
|
char* lasso_xmlnode_to_string(xmlNode *node, gboolean format, int level);
|
|
gboolean lasso_string_to_xsd_integer(const char *str, long int *integer);
|
|
void lasso_set_string_from_prop(char **str, xmlNode *node, xmlChar *name, xmlChar *ns);
|
|
|
|
void lasso_node_add_custom_namespace(LassoNode *node, const char *prefix, const char *href);
|
|
|
|
int lasso_node_set_signature(LassoNode *node, LassoSignatureContext context);
|
|
|
|
LassoSignatureContext lasso_node_get_signature(LassoNode *node);
|
|
|
|
void lasso_node_set_encryption(LassoNode *node, xmlSecKey *encryption_public_key,
|
|
LassoEncryptionSymKeyType encryption_sym_key_type);
|
|
|
|
void lasso_node_get_encryption(LassoNode *node, xmlSecKey **encryption_public_key,
|
|
LassoEncryptionSymKeyType *encryption_sym_key_type);
|
|
gboolean lasso_base64_decode(const char *from, char **buffer, int *buffer_len);
|
|
|
|
LassoSignatureContext lasso_make_signature_context_from_buffer(const char *buffer, size_t length,
|
|
const char *password, LassoSignatureMethod signature_method,
|
|
const char *certificate);
|
|
|
|
LassoSignatureContext lasso_make_signature_context_from_path_or_string(char *filename_or_buffer,
|
|
const char *password, LassoSignatureMethod signature_method,
|
|
const char *certificate);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif /* __cplusplus */
|
|
|
|
#endif /* __LASSO_XML_PRIVATE_H__ */
|