};
}
@Override
public boolean assertEvent(SecurityEvent securityEvent) throws WSSPolicyException {
AlgorithmSuiteSecurityEvent algorithmSuiteSecurityEvent = (AlgorithmSuiteSecurityEvent) securityEvent;
AlgorithmSuite algorithmSuite = (AlgorithmSuite) getAssertion();
XMLSecurityConstants.AlgorithmUsage keyUsage = algorithmSuiteSecurityEvent.getAlgorithmUsage();
if (WSSConstants.Sym_Sig.equals(keyUsage)) {
if (algorithmSuite.getSymmetricSignature() != null
&& !algorithmSuite.getSymmetricSignature().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Symmetric signature algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (algorithmSuite.getAlgorithmSuiteType() != null) {
if (!algorithmSuiteSecurityEvent.isDerivedKey()
&& (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength()
|| algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) {
setAsserted(false);
setErrorMessage("Symmetric signature algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
} else if (algorithmSuiteSecurityEvent.isDerivedKey()
&& algorithmSuite.getAlgorithmSuiteType().getSignatureDerivedKeyLength() != algorithmSuiteSecurityEvent.getKeyLength()) {
setAsserted(false);
setErrorMessage("Symmetric signature algorithm derived key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
}
} else if (WSSConstants.Asym_Sig.equals(keyUsage)) {
if (algorithmSuite.getAsymmetricSignature() != null
&& !algorithmSuite.getAsymmetricSignature().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Asymmetric algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (algorithmSuite.getAlgorithmSuiteType() != null
&& (algorithmSuite.getAlgorithmSuiteType().getMinimumAsymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength()
|| algorithmSuite.getAlgorithmSuiteType().getMaximumAsymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) {
setAsserted(false);
setErrorMessage("Asymmetric signature algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.SigDig.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getDigest().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Digest algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Enc.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getEncryption().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Encryption algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (algorithmSuite.getAlgorithmSuiteType() != null) {
if (!algorithmSuiteSecurityEvent.isDerivedKey()
&& (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength()
|| algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) {
setAsserted(false);
setErrorMessage("Symmetric encryption algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
} else if (algorithmSuiteSecurityEvent.isDerivedKey()
&& algorithmSuite.getAlgorithmSuiteType().getEncryptionDerivedKeyLength() != algorithmSuiteSecurityEvent.getKeyLength()) {
setAsserted(false);
setErrorMessage("Symmetric encryption algorithm derived key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
}
} else if (WSSConstants.Sym_Key_Wrap.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getSymmetricKeyWrap().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Symmetric key wrap algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (algorithmSuite.getAlgorithmSuiteType() != null
&& (algorithmSuite.getAlgorithmSuiteType().getMinimumSymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength()
|| algorithmSuite.getAlgorithmSuiteType().getMaximumSymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) {
setAsserted(false);
setErrorMessage("Symmetric key wrap algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Asym_Key_Wrap.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getAsymmetricKeyWrap().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Asymmetric key wrap algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (algorithmSuite.getAlgorithmSuiteType() != null
&& (algorithmSuite.getAlgorithmSuiteType().getMinimumAsymmetricKeyLength() > algorithmSuiteSecurityEvent.getKeyLength()
|| algorithmSuite.getAlgorithmSuiteType().getMaximumAsymmetricKeyLength() < algorithmSuiteSecurityEvent.getKeyLength())) {
setAsserted(false);
setErrorMessage("Asymmetric key wrap algorithm key length " + algorithmSuiteSecurityEvent.getKeyLength() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Comp_Key.equals(keyUsage)) {
if (algorithmSuite.getComputedKey() != null
&& !algorithmSuite.getComputedKey().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Computed key algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Enc_KD.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getEncryptionKeyDerivation().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Encryption key derivation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Sig_KD.equals(keyUsage)) {
if (algorithmSuite.getAlgorithmSuiteType() != null
&& !algorithmSuite.getAlgorithmSuiteType().getSignatureKeyDerivation().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Signature key derivation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.SigC14n.equals(keyUsage)) {
if (algorithmSuite.getC14n() != null
&& !algorithmSuite.getC14n().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("C14N algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.SigTransform.equals(keyUsage)) {
if (algorithmSuite.getC14n() != null
&& !algorithmSuite.getC14n().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())
&& !WSSConstants.SOAPMESSAGE_NS10_STRTransform.equals(algorithmSuiteSecurityEvent.getAlgorithmURI())
&& !WSSConstants.SWA_ATTACHMENT_CONTENT_SIG_TRANS.equals(algorithmSuiteSecurityEvent.getAlgorithmURI())
&& !WSSConstants.SWA_ATTACHMENT_COMPLETE_SIG_TRANS.equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Transform C14N algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.Soap_Norm.equals(keyUsage)) {
if (algorithmSuite.getSoapNormType() != null
&& !algorithmSuite.getSoapNormType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("Soap normalization algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.STR_Trans.equals(keyUsage)) {
if (algorithmSuite.getStrType() != null
&& !algorithmSuite.getStrType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("STR transformation algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
} else if (WSSConstants.XPath.equals(keyUsage) &&
algorithmSuite.getXPathType() != null &&
!algorithmSuite.getXPathType().getValue().equals(algorithmSuiteSecurityEvent.getAlgorithmURI())) {
setAsserted(false);
setErrorMessage("XPath algorithm " + algorithmSuiteSecurityEvent.getAlgorithmURI() + " does not meet policy");
policyAsserter.unassertPolicy(getAssertion(), getErrorMessage());
}
if (isAsserted()) {
policyAsserter.assertPolicy(getAssertion());