Improved encrypted assertion.

This commit is contained in:
Hans
2015-05-09 01:11:18 +02:00
parent d8a03cba30
commit 2648e321d2
2 changed files with 64 additions and 29 deletions

View File

@@ -36,7 +36,7 @@ from saml2.s_utils import rndstr
from saml2.s_utils import success_status_factory
from saml2.s_utils import decode_base64_and_inflate
from saml2.s_utils import UnsupportedBinding
from saml2.samlp import AuthnRequest, SessionIndex
from saml2.samlp import AuthnRequest, SessionIndex, response_from_string
from saml2.samlp import AuthzDecisionQuery
from saml2.samlp import AuthnQuery
from saml2.samlp import AssertionIDRequest
@@ -504,7 +504,7 @@ class Entity(HTTPBase):
def _response(self, in_response_to, consumer_url=None, status=None,
issuer=None, sign=False, to_sign=None,
encrypt_assertion=False, encrypt_assertion_self_contained=False, encrypted_advice_attributes=False,
encrypt_cert=None, **kwargs):
encrypt_cert=None,sign_assertion=None, **kwargs):
""" Create a Response.
Encryption:
encrypt_assertion must be true for encryption to be performed. If encrypted_advice_attributes also is
@@ -541,13 +541,14 @@ class Entity(HTTPBase):
if not sign and to_sign and not encrypt_assertion:
return signed_instance_factory(response, self.sec, to_sign)
if encrypt_assertion:
node_xpath = None
if encrypt_assertion or (encrypted_advice_attributes and response.assertion.advice is not None and
len(response.assertion.advice.assertion) == 1):
if sign:
response.signature = pre_signature_part(response.id,
self.sec.my_cert, 1)
sign_class = [(class_name(response), response.id)]
cbxs = CryptoBackendXmlSec1(self.config.xmlsec_binary)
encrypt_advice = False
if encrypted_advice_attributes and response.assertion.advice is not None \
and len(response.assertion.advice.assertion) == 1:
tmp_assertion = response.assertion.advice.assertion[0]
@@ -558,25 +559,58 @@ class Entity(HTTPBase):
else:
response.assertion.advice.encrypted_assertion[0].add_extension_element(tmp_assertion)
response.assertion.advice.assertion = []
to_sign_advice = []
if sign_assertion is not None and sign_assertion:
if response.assertion.advice and response.assertion.advice.assertion:
for tmp_assertion in response.assertion.advice.assertion:
tmp_assertion.signature = pre_signature_part(tmp_assertion.id, self.sec.my_cert, 1)
to_sign_advice.append((class_name(tmp_assertion), tmp_assertion.id))
if encrypt_assertion_self_contained:
advice_tag = response.assertion.advice._to_element_tree().tag
assertion_tag = tmp_assertion._to_element_tree().tag
response = response.get_xml_string_with_self_contained_assertion_within_advice_encrypted_assertion(
assertion_tag, advice_tag)
response = response.\
get_xml_string_with_self_contained_assertion_within_advice_encrypted_assertion(assertion_tag,
advice_tag)
node_xpath = ''.join(["/*[local-name()=\"%s\"]" % v for v in
["Response", "Assertion", "Advice", "EncryptedAssertion", "Assertion"]])
elif encrypt_assertion_self_contained:
if to_sign_advice:
response = signed_instance_factory(response, self.sec, to_sign_advice)
_, cert_file = make_temp("%s" % encrypt_cert, decode=False)
response = cbxs.encrypt_assertion(response, cert_file,
pre_encryption_part(), node_xpath=node_xpath)
encrypt_advice = True
if encrypt_assertion:
response = response_from_string(response)
if encrypt_assertion:
if encrypt_assertion_self_contained:
assertion_tag = None
try:
assertion_tag = response.assertion._to_element_tree().tag
except:
assertion_tag = response.assertion[0]._to_element_tree().tag
response = pre_encrypt_assertion(response)
response = response.get_xml_string_with_self_contained_assertion_within_encrypted_assertion(
assertion_tag)
else:
response = pre_encrypt_assertion(response)
if to_sign:
response = signed_instance_factory(response, self.sec, to_sign)
to_sign_assertion = []
if sign_assertion is not None and sign_assertion:
response.assertion.signature = pre_signature_part(response.assertion.id, self.sec.my_cert, 1)
to_sign_assertion.append((class_name(response.assertion), response.assertion.id))
if to_sign_assertion:
response = signed_instance_factory(response, self.sec, to_sign_assertion)
if encrypt_cert is not None and not encrypt_advice:
_, cert_file = make_temp("%s" % encrypt_cert, decode=False)
else:
tmp_cert_str = "%s" % self.sec.my_cert
if "-----BEGIN CERTIFICATE-----" not in tmp_cert_str:
tmp_cert_str = "-----BEGIN CERTIFICATE-----\n" + tmp_cert_str
if "-----END CERTIFICATE-----" not in tmp_cert_str:
tmp_cert_str = tmp_cert_str + "\n-----END CERTIFICATE-----\n"
_, cert_file = make_temp(tmp_cert_str, decode=False)
response = cbxs.encrypt_assertion(response, cert_file,
pre_encryption_part(), node_xpath=node_xpath)
pre_encryption_part())
# template(response.assertion.id))
if sign:
return signed_instance_factory(response, self.sec, sign_class)

View File

@@ -357,7 +357,7 @@ class Server(Entity):
# tmp_authn_statement = authn_statement
# authn_statement = None
if encrypt_assertion and encrypted_advice_attributes:
if encrypted_advice_attributes:
assertion_attributes = self.setup_assertion(None, sp_entity_id, None, None, None, policy,
None, None, identity, best_effort, sign_response, False)
assertion = self.setup_assertion(authn, sp_entity_id, in_response_to, consumer_url,
@@ -374,15 +374,15 @@ class Server(Entity):
sign_response)
to_sign = []
if sign_assertion is not None and sign_assertion:
if assertion.advice and assertion.advice.assertion:
for tmp_assertion in assertion.advice.assertion:
tmp_assertion.signature = pre_signature_part(tmp_assertion.id, self.sec.my_cert, 1)
to_sign.append((class_name(tmp_assertion), tmp_assertion.id))
assertion.signature = pre_signature_part(assertion.id,
self.sec.my_cert, 1)
#if sign_assertion is not None and sign_assertion:
# if assertion.advice and assertion.advice.assertion:
# for tmp_assertion in assertion.advice.assertion:
# tmp_assertion.signature = pre_signature_part(tmp_assertion.id, self.sec.my_cert, 1)
# to_sign.append((class_name(tmp_assertion), tmp_assertion.id))
# assertion.signature = pre_signature_part(assertion.id,
# self.sec.my_cert, 1)
# Just the assertion or the response and the assertion ?
to_sign.append((class_name(assertion), assertion.id))
# to_sign.append((class_name(assertion), assertion.id))
# Store which assertion that has been sent to which SP about which
@@ -401,7 +401,8 @@ class Server(Entity):
sign_response, to_sign, encrypt_assertion=encrypt_assertion,
encrypt_cert=encrypt_cert,
encrypt_assertion_self_contained=encrypt_assertion_self_contained,
encrypted_advice_attributes=encrypted_advice_attributes, **args)
encrypted_advice_attributes=encrypted_advice_attributes,sign_assertion=sign_assertion,
**args)
# ------------------------------------------------------------------------