Skip to content

Commit b11137a

Browse files
authored
Support default RSA-OAEP decryption parameters
Assign default RSA-OAEP parameters according to RFC 4337 if they were not in the XML
1 parent 8075fa6 commit b11137a

File tree

4 files changed

+59
-10
lines changed

4 files changed

+59
-10
lines changed

build.savant

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ jakartaXMLBindVersion = "4.0.0"
1919
slf4jVersion = "2.0.7"
2020
testngVersion = "7.8.0"
2121

22-
project(group: "io.fusionauth", name: "fusionauth-samlv2", version: "0.11.0", licenses: ["ApacheV2_0"]) {
22+
project(group: "io.fusionauth", name: "fusionauth-samlv2", version: "0.11.1", licenses: ["ApacheV2_0"]) {
2323
workflow {
2424
fetch {
2525
cache()

src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1205,12 +1205,23 @@ private Key decryptKey(EncryptedKeyType encryptedKey, PrivateKey transportEncryp
12051205
mgf = MaskGenerationFunction.MGF1_SHA1;
12061206
}
12071207

1208-
// Check we have necessary parameters
1208+
// If the parameters could not be resolved:
1209+
// 1) Use defaults from RFC 3447 if no values were found in XML
1210+
// 2) Throw an exception if an XML value could not be resolved to an enum value
1211+
// https://www.rfc-editor.org/rfc/rfc3447#appendix-A.2.1
12091212
if (digest == null) {
1210-
throw new SAMLException("Unable to determine digest algorithm from URI [" + digestUri + "]");
1213+
if (digestUri == null) {
1214+
digest = DigestAlgorithm.SHA1;
1215+
} else {
1216+
throw new SAMLException("Unable to determine digest algorithm from URI [" + digestUri + "]");
1217+
}
12111218
}
12121219
if (mgf == null) {
1213-
throw new SAMLException("Unable to determine mask generation function from URI [" + mgfUri + "]");
1220+
if (mgfUri == null) {
1221+
mgf = MaskGenerationFunction.MGF1_SHA1;
1222+
} else {
1223+
throw new SAMLException("Unable to determine mask generation function from URI [" + mgfUri + "]");
1224+
}
12141225
}
12151226

12161227
// Create cryptographic parameters and initialize the cipher instance

src/test/java/io/fusionauth/samlv2/service/DefaultSAMLv2ServiceTest.java

Lines changed: 43 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@
4242
import java.security.cert.Certificate;
4343
import java.security.cert.CertificateFactory;
4444
import java.security.cert.X509Certificate;
45+
import java.security.spec.RSAPrivateKeySpec;
4546
import java.security.spec.RSAPublicKeySpec;
4647
import java.security.spec.X509EncodedKeySpec;
4748
import java.time.ZoneOffset;
@@ -111,6 +112,42 @@
111112
@SuppressWarnings({"unchecked"})
112113
@Test(groups = "unit")
113114
public class DefaultSAMLv2ServiceTest {
115+
@Test
116+
public void assertionDecryptionDefaults() throws Exception {
117+
// If RSA-OAEP Digest and Mask Generation Function are not specified by XML, decryption should fall back to the defaults
118+
119+
// Build a known key pair.
120+
KeyFactory factory = KeyFactory.getInstance("RSA");
121+
// The public key is not required for this test, but it may be useful to modify or expand this test in the future
122+
// PublicKey publicKey = factory.generatePublic(new RSAPublicKeySpec(new BigInteger("21734648244307152755738902242704624429675455693104061482953980655823499524284217582577935962219675181839097134429878676848067944269649003417313253763145613039845156858929146350893510281417425701635390227843218753386852942958087790126591910892081707753005524949329857277363222746280909051526362184081185954039703446436022345307092346517413518280909483768946131477611274390374625720745000173012484689181319542884541163003470909355448313533318136237678943263133529991715284549440616270148923866161198748312992261382455526114770464413102345807150728423473869759031086596301998397561122681012070445972165920288084712186321"), new BigInteger("65537")));
123+
PrivateKey privateKey = factory.generatePrivate(
124+
new RSAPrivateKeySpec(
125+
new BigInteger("21734648244307152755738902242704624429675455693104061482953980655823499524284217582577935962219675181839097134429878676848067944269649003417313253763145613039845156858929146350893510281417425701635390227843218753386852942958087790126591910892081707753005524949329857277363222746280909051526362184081185954039703446436022345307092346517413518280909483768946131477611274390374625720745000173012484689181319542884541163003470909355448313533318136237678943263133529991715284549440616270148923866161198748312992261382455526114770464413102345807150728423473869759031086596301998397561122681012070445972165920288084712186321"),
126+
new BigInteger("2627246950446332058699110175423135552922607992443510918533979809198372876869242896214083780043399404771798030104421912476774863886112568550161826087731198353627009668377202151330979270479101063648863411278727725778272563805391938498601722966981572071033305898173415465329072899217806147766785803779409419532480730005663347830294097525463269173509836986107754922630483079886942638729284878709865541937468056706189367357847138095922090696226255189351459450052835991176393120796259048519702721129794393046985282164398590601866202429118551867608688177161937729422431790107723304390299253182892873596285122556471119338537")
127+
)
128+
);
129+
130+
// Load an unsigned sample response encrypted using the associated public certificate from above
131+
byte[] ba = Files.readAllBytes(Paths.get("src/test/xml/encodedResponse-assertionDecryptionDefaults.txt"));
132+
String encodedXML = new String(ba, StandardCharsets.UTF_8);
133+
134+
// Parse the encrypted sample response
135+
DefaultSAMLv2Service service = new DefaultSAMLv2Service();
136+
AuthenticationResponse parsedResponse = service.parseResponse(
137+
encodedXML,
138+
false, null,
139+
true, privateKey
140+
);
141+
142+
// Load a known encoded sample response from file and parse it
143+
ba = Files.readAllBytes(Paths.get("src/test/xml/encodedResponse.txt"));
144+
String encodedResponse = new String(ba, StandardCharsets.UTF_8);
145+
AuthenticationResponse response = service.parseResponse(encodedResponse, false, null);
146+
147+
// Verify the parsed encrypted response matches the original pulled from file
148+
assertEquals(parsedResponse, response);
149+
}
150+
114151
@DataProvider(name = "assertionEncryption")
115152
public Object[][] assertionEncryption() {
116153
return new Object[][]{
@@ -547,8 +584,8 @@ public void parseLogout_Request_raw(Binding binding) throws Exception {
547584
String redirectSignature = Files.readString(Paths.get("src/test/xml/signature/logout-request.txt"));
548585
String x509encoded = "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";
549586
try (InputStream is = new ByteArrayInputStream(Base64.getMimeDecoder().decode(x509encoded))) {
550-
CertificateFactory factor = CertificateFactory.getInstance("X.509");
551-
certificate = (X509Certificate) factor.generateCertificate(is);
587+
CertificateFactory factory = CertificateFactory.getInstance("X.509");
588+
certificate = (X509Certificate) factory.generateCertificate(is);
552589
}
553590

554591
assertNotNull(certificate);
@@ -1025,8 +1062,8 @@ public void parse_LogoutRequest(Binding binding) throws Exception {
10251062
String redirectSignature = Files.readString(Paths.get("src/test/xml/signature/logout-request.txt"));
10261063
String x509encoded = "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";
10271064
try (InputStream is = new ByteArrayInputStream(Base64.getMimeDecoder().decode(x509encoded))) {
1028-
CertificateFactory factor = CertificateFactory.getInstance("X.509");
1029-
certificate = (X509Certificate) factor.generateCertificate(is);
1065+
CertificateFactory factory = CertificateFactory.getInstance("X.509");
1066+
certificate = (X509Certificate) factory.generateCertificate(is);
10301067
}
10311068

10321069
assertNotNull(certificate);
@@ -1069,8 +1106,8 @@ public void parse_LogoutResponse(Binding binding) throws Exception {
10691106
String redirectSignature = Files.readString(Paths.get("src/test/xml/signature/logout-response.txt"));
10701107
String x509encoded = "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";
10711108
try (InputStream is = new ByteArrayInputStream(Base64.getMimeDecoder().decode(x509encoded))) {
1072-
CertificateFactory factor = CertificateFactory.getInstance("X.509");
1073-
certificate = (X509Certificate) factor.generateCertificate(is);
1109+
CertificateFactory factory = CertificateFactory.getInstance("X.509");
1110+
certificate = (X509Certificate) factory.generateCertificate(is);
10741111
}
10751112

10761113
assertNotNull(certificate);
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
<?xml version="1.0" encoding="UTF-8" standalone="no"?><ns3:Response xmlns:ns3="urn:oasis:names:tc:SAML:2.0:protocol" xmlns="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:ns2="http://www.w3.org/2000/09/xmldsig#" xmlns:ns4="http://www.w3.org/2001/04/xmlenc#" Destination="https://local.fusionauth.io/oauth2/callback" ID="_c81837ac-6465-41cc-a102-6257d7112473" InResponseTo="id31f83b35-5954-4b67-acf8-763c15fc3aac" IssueInstant="2019-02-28T18:29:55.473Z" Version="2.0"><Issuer>https://sts.windows.net/c2150111-3c44-4508-9f08-790cb4032a23/</Issuer><ns3:Status><ns3:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></ns3:Status><EncryptedAssertion><ns4:EncryptedData Type="http://www.w3.org/2001/04/xmlenc#Element"><ns4:EncryptionMethod Algorithm="http://www.w3.org/2009/xmlenc11#aes256-gcm"/><ns4:CipherData><ns4:CipherValue>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</ns4:CipherValue></ns4:CipherData></ns4:EncryptedData><ns4:EncryptedKey><ns4:EncryptionMethod Algorithm="http://www.w3.org/2009/xmlenc11#rsa-oaep"/><ns4:CipherData><ns4:CipherValue>mv0tA/maWRBip9HTqyuE/gwxy0i5YBxJx8zrAV9t59hrzs1T2KXNhGesgQOTNfwTF7GsUvHbMfv6RB2aiYXyTVtMyO/cNv0saW2VT6L4IrgClb8avfBh4H9wCfzYwWvtlxmQjqL9DIZ2Qzgfek6J9zzwxivS1PewhMt/2E6mbZx9+s7Dvcxr7I6ubAqUhfP8aDx0CFjNrMyfG4OglgmRYH7q/vFlSCFqG5FePLUPhwAos6US6msNZQOhph/nWKsplVVXRpdr28Tf7eSJ4+eJo1vPRfwCTIlw03Xhrt+oTqicqOk8BthWfI8ZtNoshmQdWZ6VzuTaxYnSuLzP2MzBkA==</ns4:CipherValue></ns4:CipherData></ns4:EncryptedKey></EncryptedAssertion></ns3:Response>

0 commit comments

Comments
 (0)