AuthzInfo.java

  1. /*******************************************************************************
  2.  * Copyright (c) 2019, RISE AB
  3.  * All rights reserved.
  4.  *
  5.  * Redistribution and use in source and binary forms, with or without
  6.  * modification, are permitted provided that the following conditions
  7.  * are met:
  8.  *
  9.  * 1. Redistributions of source code must retain the above copyright notice,
  10.  *    this list of conditions and the following disclaimer.
  11.  *
  12.  * 2. Redistributions in binary form must reproduce the above copyright notice,
  13.  *    this list of conditions and the following disclaimer in the documentation
  14.  *    and/or other materials provided with the distribution.
  15.  *
  16.  * 3. Neither the name of the copyright holder nor the names of its
  17.  *    contributors may be used to endorse or promote products derived from
  18.  *    this software without specific prior written permission.
  19.  *
  20.  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  21.  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  22.  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  23.  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  24.  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  25.  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  26.  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  27.  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  28.  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  29.  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  30.  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  31.  *******************************************************************************/
  32. package se.sics.ace.rs;

  33. import java.io.IOException;
  34. import java.util.ArrayList;
  35. import java.util.Arrays;
  36. import java.util.Base64;
  37. import java.util.HashMap;
  38. import java.util.HashSet;
  39. import java.util.List;
  40. import java.util.Map;
  41. import java.util.Set;
  42. import java.util.logging.Level;
  43. import java.util.logging.Logger;

  44. import org.bouncycastle.crypto.InvalidCipherTextException;
  45. import org.eclipse.californium.oscore.CoapOSException;
  46. import org.eclipse.californium.oscore.OSCoreCtxDB;

  47. import com.upokecenter.cbor.CBORObject;
  48. import com.upokecenter.cbor.CBORType;

  49. import org.eclipse.californium.cose.CoseException;
  50. import se.sics.ace.AceException;
  51. import se.sics.ace.Constants;
  52. import se.sics.ace.Endpoint;
  53. import se.sics.ace.Message;
  54. import se.sics.ace.TimeProvider;
  55. import se.sics.ace.Util;
  56. import se.sics.ace.coap.rs.oscoreProfile.OscoreCtxDbSingleton;
  57. import se.sics.ace.cwt.CWT;
  58. import se.sics.ace.cwt.CwtCryptoCtx;

  59. /**
  60.  * This class implements the /authz_info endpoint at the RS that receives
  61.  * access tokens, verifies if they are valid and then stores them.
  62.  *
  63.  * Note this implementation requires the following claims in a CWT:
  64.  * iss, sub, scope, aud.
  65.  *
  66.  * @author Ludwig Seitz and Marco Tiloca
  67.  *
  68.  */
  69. public class AuthzInfo implements Endpoint, AutoCloseable {
  70.    
  71.     /**
  72.      * The logger
  73.      */
  74.     private static final Logger LOGGER
  75.         = Logger.getLogger(AuthzInfo.class.getName());

  76.     /**
  77.      * The acceptable issuers
  78.      */
  79.     private List<String> issuers;
  80.    
  81.     /**
  82.      * Provides system time
  83.      */
  84.     private TimeProvider time;
  85.    
  86.     /**
  87.      * Handles introspection of tokens
  88.      */
  89.     private IntrospectionHandler intro;
  90.    
  91.     /**
  92.      * Handles audience validation
  93.      */
  94.     private AudienceValidator audience;
  95.    
  96.     /**
  97.      * The crypto context to use with the AS
  98.      */
  99.     private CwtCryptoCtx ctx;
  100.        
  101.     /**
  102.      * Flag to indicate if we need to check cnonces
  103.      */
  104.     private boolean checkCnonce;
  105.    
  106.     /**
  107.      * Each set of the list refers to a different size of Recipient IDs.
  108.      * The element with index 0 includes as elements Recipient IDs with size 1 byte.
  109.      */
  110.     private static List<Set<Integer>> usedRecipientIds = new ArrayList<Set<Integer>>();
  111.    
  112.     /**
  113.      * Constructor. Needs an initialized TokenRepository.
  114.      *
  115.      * @param issuers  the list of acceptable issuer of access tokens
  116.      * @param time  the time provider
  117.      * @param intro  the introspection handler (can be null)
  118.      * @param rsId  the identifier of the Resource Server
  119.      * @param audience  the audience validator
  120.      * @param ctx  the crypto context to use with the As
  121.      * @param keyDerivationKey  the key derivation key to use with the As, it can be null
  122.      * @param derivedKeySize  the size in bytes of symmetric keys derived with the key derivation key
  123.      * @param tokenFile  the file where to save tokens when persisting
  124.      * @param scopeValidator  the application specific scope validator
  125.      * @param checkCnonce  true if this RS uses cnonces for freshness validation
  126.      * @throws AceException  if the token repository is not initialized
  127.      * @throws IOException
  128.      */
  129.     public AuthzInfo(List<String> issuers,
  130.             TimeProvider time, IntrospectionHandler intro, String rsId,
  131.             AudienceValidator audience, CwtCryptoCtx ctx, byte[] keyDerivationKey, int derivedKeySize,
  132.             String tokenFile, ScopeValidator scopeValidator, boolean checkCnonce)
  133.                     throws AceException, IOException {
  134.         if (TokenRepository.getInstance()==null) {    
  135.             TokenRepository.create(scopeValidator, tokenFile, ctx, keyDerivationKey, derivedKeySize, time, rsId);
  136.         }
  137.         this.issuers = new ArrayList<>();
  138.         this.issuers.addAll(issuers);
  139.         this.time = time;
  140.         this.intro = intro;
  141.         this.audience = audience;
  142.         this.ctx = ctx;
  143.         this.checkCnonce = checkCnonce;
  144.        
  145.         for (int i = 0; i < 4; i++) {
  146.             // Empty sets of assigned Sender IDs; one set for each possible Sender ID size in bytes.
  147.             // The set with index 0 refers to Sender IDs with size 1 byte
  148.             usedRecipientIds.add(new HashSet<Integer>());
  149.         }
  150.        
  151.     }

  152.     @Override
  153.     public synchronized Message processMessage(Message msg) {
  154.         LOGGER.log(Level.INFO, "received message: " + msg);
  155.         CBORObject token = null;
  156.         try {
  157.             token = CBORObject.DecodeFromBytes(msg.getRawPayload());
  158.         } catch (Exception e) {
  159.             LOGGER.info("Invalid payload at authz-info: " + e.getMessage());
  160.             CBORObject map = CBORObject.NewMap();
  161.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  162.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  163.         }
  164.         return processToken(token, msg);
  165.     }
  166.    
  167.     protected synchronized Message processToken(CBORObject token,  Message msg) {
  168.         Map<Short, CBORObject> claims = null;
  169.        
  170.         byte[] recipientId = null;
  171.         boolean recipientIdFound = false;

  172.         //1. Check whether it is a CWT or REF type
  173.         if (token.getType().equals(CBORType.ByteString)) {
  174.             try {
  175.                 claims = processReferenceToken(token);
  176.             } catch (AceException e) {
  177.                 LOGGER.severe("Message processing aborted: " + e.getMessage());
  178.                 return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  179.             } catch (IntrospectionException e) {
  180.                 LOGGER.info("Introspection error, "
  181.                          + "message processing aborted: " + e.getMessage());
  182.                 if (e.getMessage().isEmpty()) {
  183.                     return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  184.                 }
  185.                 CBORObject map = CBORObject.NewMap();
  186.                 map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  187.                 map.Add(Constants.ERROR_DESCRIPTION, e.getMessage());
  188.                 return msg.failReply(e.getCode(), map);
  189.             }
  190.         } else if (token.getType().equals(CBORType.Array)) {
  191.             try {
  192.                 claims = processCWT(token);
  193.             } catch (IntrospectionException e) {
  194.                 LOGGER.info("Introspection error, "
  195.                         + "message processing aborted: " + e.getMessage());
  196.                if (e.getMessage().isEmpty()) {
  197.                    return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  198.                }
  199.                CBORObject map = CBORObject.NewMap();
  200.                map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  201.                map.Add(Constants.ERROR_DESCRIPTION, e.getMessage());
  202.                return msg.failReply(e.getCode(), map);
  203.             } catch (AceException | CoseException
  204.                     | InvalidCipherTextException e) {
  205.                 LOGGER.info("Token invalid: " + e.getMessage());
  206.                 CBORObject map = CBORObject.NewMap();
  207.                 map.Add(Constants.ERROR, Constants.UNAUTHORIZED_CLIENT);
  208.                 map.Add(Constants.ERROR_DESCRIPTION, "Token is invalid");
  209.                 return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  210.             } catch (Exception e) {
  211.                 LOGGER.severe("Unsupported key wrap algorithm in token: "
  212.                         + e.getMessage());
  213.                 return msg.failReply(Message.FAIL_NOT_IMPLEMENTED, null);
  214.             }
  215.         } else {
  216.             CBORObject map = CBORObject.NewMap();
  217.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  218.             map.Add(Constants.ERROR_DESCRIPTION, "Unknown token format");
  219.             LOGGER.info("Message processing aborted: invalid request");
  220.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  221.         }
  222.        
  223.         //2. Check if the token is active, this will only be present if we
  224.         // did introspect
  225.         CBORObject active = claims.get(Constants.ACTIVE);
  226.         if (active != null && active.isFalse()) {
  227.             CBORObject map = CBORObject.NewMap();
  228.             map.Add(Constants.ERROR, Constants.UNAUTHORIZED_CLIENT);
  229.             map.Add(Constants.ERROR_DESCRIPTION, "Token is not active");
  230.             LOGGER.info("Message processing aborted: Token is not active");
  231.             return msg.failReply(Message.FAIL_UNAUTHORIZED, map);
  232.         }

  233.         //3. Check that the token is not expired (exp)
  234.         CBORObject exp = claims.get(Constants.EXP);
  235.         if (exp != null && exp.AsNumber().ToInt64Checked() < this.time.getCurrentTime()) {
  236.             CBORObject map = CBORObject.NewMap();
  237.             map.Add(Constants.ERROR, Constants.UNAUTHORIZED_CLIENT);
  238.             map.Add(Constants.ERROR_DESCRIPTION, "Token is expired");
  239.             LOGGER.log(Level.INFO, "Message processing aborted: "
  240.                     + "Token is expired");
  241.             return msg.failReply(Message.FAIL_UNAUTHORIZED, map);
  242.         }  
  243.      
  244.         //4. Check if we accept the issuer (iss)
  245.         CBORObject iss = claims.get(Constants.ISS);
  246.         if (iss != null) {
  247.             if (!this.issuers.contains(iss.AsString())) {
  248.                 CBORObject map = CBORObject.NewMap();
  249.                 map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  250.                 map.Add(Constants.ERROR_DESCRIPTION, "Token issuer unknown");
  251.                 LOGGER.log(Level.INFO, "Message processing aborted: "
  252.                         + "Token issuer unknown");
  253.                 return msg.failReply(Message.FAIL_UNAUTHORIZED, map);
  254.             }
  255.         }
  256.        
  257.         //5. Check if we are the audience (aud)
  258.         CBORObject audCbor = claims.get(Constants.AUD);
  259.         if (audCbor == null) {
  260.             CBORObject map = CBORObject.NewMap();
  261.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  262.             map.Add(Constants.ERROR_DESCRIPTION, "Token has no audience");
  263.             LOGGER.log(Level.INFO, "Message processing aborted: "
  264.                     + "Token has no audience");
  265.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  266.         }

  267.         String aud;
  268.         if (audCbor.getType().equals(CBORType.TextString)) {
  269.             aud = audCbor.AsString();  
  270.         } else {//Error
  271.             CBORObject map = CBORObject.NewMap();
  272.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  273.             map.Add(Constants.ERROR_DESCRIPTION, "Audience malformed");
  274.             LOGGER.log(Level.INFO, "Message processing aborted: "
  275.                     + "audience malformed");
  276.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  277.         }
  278.        
  279.         boolean audMatch = false;
  280.         if (this.audience.match(aud)) {
  281.             audMatch = true;
  282.         }
  283.         if (!audMatch) {
  284.             CBORObject map = CBORObject.NewMap();
  285.             map.Add(Constants.ERROR, Constants.UNAUTHORIZED_CLIENT);
  286.             map.Add(Constants.ERROR_DESCRIPTION, "Audience does not apply");
  287.             LOGGER.log(Level.INFO, "Message processing aborted: "
  288.                     + "Audience does not apply");
  289.             return msg.failReply(Message.FAIL_FORBIDDEN, map);
  290.         }

  291.         //6. Check if the token has a scope
  292.         CBORObject scope = claims.get(Constants.SCOPE);
  293.         if (scope == null) {
  294.             CBORObject map = CBORObject.NewMap();
  295.             map.Add(Constants.ERROR, Constants.INVALID_SCOPE);
  296.             map.Add(Constants.ERROR_DESCRIPTION, "Token has no scope");
  297.             LOGGER.log(Level.INFO, "Message processing aborted: "
  298.                     + "Token has no scope");
  299.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  300.         }
  301.        
  302.         //7. Check if any part of the scope is meaningful to us
  303.         boolean meaningful = false;
  304.         try {
  305.             if(scope.getType().equals(CBORType.TextString)) {
  306.                 meaningful = TokenRepository.getInstance().checkScope(scope);
  307.             }
  308.             else {
  309.                 // The version of checkScope() with two arguments is invoked
  310.                 // This is currently expecting a structured scope for joining OSCORE groups
  311.                 meaningful = TokenRepository.getInstance().checkScope(scope, aud);
  312.             }
  313.         } catch (AceException e) {
  314.             LOGGER.info("Invalid scope, "
  315.                     + "message processing aborted: " + e.getMessage());
  316.             CBORObject map = CBORObject.NewMap();
  317.             map.Add(Constants.ERROR, Constants.INVALID_SCOPE);
  318.             map.Add(Constants.ERROR_DESCRIPTION, "Scope has invalid format");
  319.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  320.         }
  321.         if (!meaningful) {
  322.             CBORObject map = CBORObject.NewMap();
  323.             map.Add(Constants.ERROR, Constants.INVALID_SCOPE);
  324.             map.Add(Constants.ERROR_DESCRIPTION, "Scope does not apply");
  325.             LOGGER.log(Level.INFO, "Message processing aborted: "
  326.                     + "Token's scope does not apply");
  327.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  328.         }
  329.        
  330.         //8. Handle EXI if present
  331.         int exiSeqNum = handleExi(claims);
  332.         if (exiSeqNum < -1) {
  333.             // The 'exi' claim is present, but an error occurs during its processing
  334.             CBORObject map = CBORObject.NewMap();
  335.             String errStr = null;
  336.             switch (exiSeqNum) {
  337.                 case -2: // the 'cti' claim is not present in the Access Token as a CBOR byte string
  338.                     errStr = "The Access Token includes the 'exi' claim, but the 'cti' claim is not present as a CBOR byte string";
  339.                     break;
  340.                 case -3: // the 'cti' claim is present but it is not formatted as expected
  341.                     errStr = "The Access Token includes the 'exi' claim, but the 'cti' claim is not formatted as expected";
  342.                     break;  
  343.                 case -4: // the Sequence Number encoded in the 'cti' claim is not greater than the stored highest Sequence Number
  344.                     errStr = "The Access Token includes the 'exi' claim, but the Sequence Number value is too little";
  345.             }
  346.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  347.             map.Add(Constants.ERROR_DESCRIPTION, errStr);
  348.             LOGGER.log(Level.INFO, "Message processing aborted: " + errStr);
  349.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  350.         }
  351.        
  352.         //9. Handle cnonce if required
  353.         try {
  354.             handleCnonce(claims);
  355.         } catch (AceException e) {
  356.             CBORObject map = CBORObject.NewMap();
  357.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  358.             map.Add(Constants.ERROR_DESCRIPTION, e.getMessage());
  359.             LOGGER.log(Level.INFO, "Message processing aborted: "
  360.                     + "error while checking cnonce: " + e.getMessage());
  361.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  362.         }
  363.        
  364.         CBORObject cnf = claims.get(Constants.CNF);
  365.         try {
  366.             if (cnf == null) {
  367.                 LOGGER.severe("Token has not cnf");
  368.                 throw new AceException("Token has no cnf");
  369.             }
  370.         }
  371.         catch (Exception e) {
  372.             LOGGER.info("No Recipient ID available to use");
  373.             return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  374.            
  375.         }
  376.        
  377.         boolean firstOscoreAccessToken = false;
  378.        
  379.         // The OSCORE profile is being used. The Resource Server has to determine
  380.         // an available Recipient ID to offer to the Client.
  381.         if (cnf.getKeys().contains(Constants.OSCORE_Input_Material)) {
  382.        
  383.             if (msg.getSenderId() != null) {
  384.                 LOGGER.info("OSCORE Input Material provided over a protected POST request");
  385.                 CBORObject map = CBORObject.NewMap();
  386.                 map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  387.                 map.Add(Constants.ERROR_DESCRIPTION,
  388.                         "OSCORE_Input_Material provided over a protected POST request");
  389.                 return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  390.             }
  391.            
  392.             CBORObject osc = cnf.get(Constants.OSCORE_Input_Material);
  393.             try {
  394.                 if (osc == null || !osc.getType().equals(CBORType.Map)) {
  395.                     LOGGER.info("Missing or invalid parameter type for "
  396.                             + "'OSCORE_Input_Material', must be CBOR-map");
  397.                     throw new AceException("invalid/missing OSCORE_Input_Material");
  398.                 }
  399.             }
  400.             catch (Exception e) {
  401.                 LOGGER.info("Invalid/missing OSCORE_Input_Material");
  402.                 CBORObject map = CBORObject.NewMap();
  403.                 map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  404.                 map.Add(Constants.ERROR_DESCRIPTION,
  405.                         "invalid/missing OSCORE_Input_Material");
  406.                 return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  407.                
  408.             }
  409.            
  410.             CBORObject cbor = CBORObject.DecodeFromBytes(msg.getRawPayload());
  411.             byte[] senderId = cbor.get(Constants.ACE_CLIENT_RECIPIENTID).GetByteString();
  412.            
  413.             OSCoreCtxDB db = OscoreCtxDbSingleton.getInstance();
  414.            
  415.             // Determine an available Recipient ID to offer to the Client as ID2 (i.e., as Client's Sender ID)
  416.             synchronized(usedRecipientIds) {
  417.                 synchronized(db) {
  418.                
  419.                     int maxIdValue;
  420.                    
  421.                     byte[] contextId = new byte[0];
  422.                     if (cnf.get(Constants.OSCORE_Input_Material).ContainsKey(Constants.OS_CONTEXTID)) {
  423.                         contextId = cnf.get(Constants.OSCORE_Input_Material).get(Constants.OS_CONTEXTID).GetByteString();
  424.                     }
  425.                    
  426.                     // Start with 1 byte as size of Recipient ID; try with up to 4 bytes in size        
  427.                     for (int idSize = 1; idSize <= 4; idSize++) {
  428.                        
  429.                         if (idSize == 4)
  430.                             maxIdValue = (1 << 31) - 1;
  431.                         else
  432.                             maxIdValue = (1 << (idSize * 8)) - 1;
  433.                        
  434.                         for (int j = 0; j <= maxIdValue; j++) {
  435.                            
  436.                             recipientId = Util.intToBytes(j, idSize);
  437.                            
  438.                             // The Recipient ID must be different than what offered by the Client in the 'id1' parameter
  439.                             if(Arrays.equals(senderId, recipientId))
  440.                                 continue;
  441.                            
  442.                             // This Recipient ID is marked as not available to use
  443.                             if (usedRecipientIds.get(idSize - 1).contains(j))
  444.                                 continue;
  445.                            
  446.                             try {
  447.                                 // This Recipient ID seems to be available to use
  448.                                 if (!usedRecipientIds.get(idSize - 1).contains(j)) {
  449.                                    
  450.                                     // Double check in the database of OSCORE Security Contexts
  451.                                     if (db.getContext(recipientId,  contextId) != null) {
  452.                                        
  453.                                         // A Security Context with this Recipient ID exists and was not tracked!
  454.                                         // Update the local list of used Recipient IDs, then move on to the next candidate
  455.                                         usedRecipientIds.get(idSize - 1).add(j);
  456.                                         continue;
  457.                                        
  458.                                     }
  459.                                     else {
  460.                                        
  461.                                         // This Recipient ID is actually available at the moment. Add it to the local list
  462.                                         usedRecipientIds.get(idSize - 1).add(j);
  463.                                         recipientIdFound = true;
  464.                                         break;
  465.                                     }
  466.                                    
  467.                                 }
  468.                             }
  469.                             catch(RuntimeException e) {
  470.                                 // Multiple Security Contexts with this Recipient ID exist and it was not tracked!
  471.                                 // Update the local list of used Recipient IDs, then move on to the next candidate
  472.                                 usedRecipientIds.get(idSize - 1).add(j);
  473.                                 continue;
  474.                             } catch (CoapOSException e) {
  475.                                 LOGGER.severe("Error while accessing the database of OSCORE Security Contexts");
  476.                                 return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  477.                             }
  478.                                
  479.                         }
  480.                        
  481.                         if (recipientIdFound)
  482.                             break;
  483.                            
  484.                     }
  485.                 }
  486.             }
  487.            
  488.             try {
  489.                 if (!recipientIdFound) {
  490.                     throw new AceException("No Recipient ID available to use");
  491.                 }
  492.             } catch (Exception e) {
  493.                 LOGGER.info("No Recipient ID available to use");
  494.                 return msg.failReply(Message.FAIL_INTERNAL_SERVER_ERROR, null);
  495.                
  496.             }
  497.    
  498.             claims.get(Constants.CNF).get(Constants.OSCORE_Input_Material).Add(Constants.OS_CLIENTID, CBORObject.FromObject(recipientId));
  499.             claims.get(Constants.CNF).get(Constants.OSCORE_Input_Material).Add(Constants.OS_SERVERID, CBORObject.FromObject(senderId));
  500.            
  501.             // This is not a Token for updating access rights,
  502.             // but rather to establish a new OSCORE Security Context
  503.             firstOscoreAccessToken = true;
  504.            
  505.         }
  506.        
  507.         //9. Extension point for handling other special claims in the future
  508.         processOther(claims);
  509.        
  510.         //10. Store the claims of this token
  511.         CBORObject cti = null;
  512.        
  513.         //Check if we have a sid
  514.         String sid = msg.getSenderId();
  515.         try {
  516.             cti = TokenRepository.getInstance().addToken(token, claims, this.ctx, sid, exiSeqNum);
  517.         } catch (AceException e) {
  518.             LOGGER.severe("Message processing aborted: " + e.getMessage());
  519.             CBORObject map = CBORObject.NewMap();
  520.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  521.             map.Add(Constants.ERROR_DESCRIPTION, e.getMessage());
  522.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  523.         }
  524.        
  525.         //11. Create success message
  526.         //Return the cti or the local identifier assigned to the token
  527.         CBORObject rep = CBORObject.NewMap();
  528.         rep.Add(Constants.CTI, cti);
  529.        
  530.         // The following enables this class to return to the specific AuthzInfo instance also the
  531.         // Sender Identifier associated to this Access Token, as 'SUB' parameter of the response.
  532.         String assignedKid = null;
  533.         String assignedSid;
  534.         try {
  535.             String ctiStr = Base64.getEncoder().encodeToString(cti.GetByteString());
  536.            
  537.             cnf = claims.get(Constants.CNF);
  538.                        
  539.             // This should really not happen for a previously validated and stored Access Token
  540.             if (cnf == null) {
  541.                 LOGGER.severe("Token has not cnf");
  542.                 throw new AceException("Token has no cnf");
  543.             }
  544.             // This should really not happen for a previously validated and stored Access Token
  545.             if (!cnf.getType().equals(CBORType.Map)) {
  546.                 LOGGER.severe("Malformed cnf in token");
  547.                 throw new AceException("cnf claim malformed in token");
  548.             }
  549.            
  550.             // Rebuild the 'kid' leveraging what already happened in the Token Repository
  551.             assignedKid = TokenRepository.getInstance().getKidByCti(ctiStr);
  552.            
  553.             // This should really not happen for a previously validated and stored Access Token
  554.             if (assignedKid == null) {
  555.                 LOGGER.severe("kid not found");
  556.                 throw new AceException("kid not found");
  557.             }
  558.            
  559.             assignedSid = TokenRepository.getInstance().getSid(assignedKid);
  560.         }
  561.         catch (Exception e) {
  562.             LOGGER.info("Unable to retrieve kid after token addition: " + e.getMessage());
  563.             CBORObject map = CBORObject.NewMap();
  564.             map.Add(Constants.ERROR, Constants.INVALID_REQUEST);
  565.             map.Add(Constants.ERROR_DESCRIPTION, e.getMessage());
  566.             return msg.failReply(Message.FAIL_BAD_REQUEST, map);
  567.         }

  568.         if (assignedSid != null)
  569.             rep.Add(Constants.SUB, assignedSid);

  570.         // If the OSCORE profile is being used, and especially a new OSCORE Security Context is
  571.         // being established, return also the selected Recipient ID to the specific AuthzInfo instance.
  572.         //
  573.         // This is not the case when a Token is posted to update access rights, by superseding an
  574.         // existing Token from which the original 'cnf' claim is inherited and retained in the new Token
  575.         if (firstOscoreAccessToken == true) {
  576.            
  577.             String recipientIdString = Base64.getEncoder().encodeToString(recipientId);
  578.             rep.Add(Constants.CLIENT_ID, recipientIdString);
  579.            
  580.         }
  581.        
  582.         LOGGER.info("Successfully processed token");
  583.         return msg.successReply(Message.CREATED, rep);
  584.     }
  585.    
  586.     /**
  587.      * Extension point for handling other special claims.
  588.      *
  589.      * @param claims all claims
  590.      */
  591.     protected synchronized void processOther(Map<Short, CBORObject> claims) {
  592.         //No processing needed
  593.     }

  594.     /**
  595.      * Process a message containing a CWT.
  596.      *
  597.      * Note: The behavior implemented here is the following:
  598.      * If we have an introspection handler, we try to introspect,
  599.      * if introspection fails we just return the claims from the CWT,
  600.      * otherwise we add the claims returned by introspection
  601.      * to those of the CWT, possibly overwriting CWT claims with
  602.      * "fresher" introspection claim having the same id.
  603.      *
  604.      * @param token  the token as CBOR
  605.      *
  606.      * @return  the claims of the CWT
  607.      *
  608.      * @throws AceException
  609.      * @throws IntrospectionException
  610.      * @throws CoseException
  611.      *
  612.      * @throws Exception  when using a not supported key wrap
  613.      */
  614.     protected synchronized Map<Short,CBORObject> processCWT(CBORObject token)
  615.             throws IntrospectionException, AceException,
  616.             CoseException, Exception {
  617.         CWT cwt = CWT.processCOSE(token.EncodeToBytes(), this.ctx);
  618.         //Check if we can introspect this token
  619.         Map<Short, CBORObject> claims = cwt.getClaims();
  620.        if (this.intro != null) {
  621.            CBORObject cti = claims.get(Constants.CTI);
  622.            if (cti != null && cti.getType().equals(CBORType.ByteString)) {
  623.                Map<Short, CBORObject> introClaims
  624.                    = this.intro.getParams(cti.GetByteString());
  625.                if (introClaims != null) {
  626.                    claims.putAll(introClaims);
  627.                }
  628.            }
  629.        }
  630.        return claims;
  631.     }
  632.    
  633.     /**
  634.      * Process a message containing a reference token.
  635.      *
  636.      * @param token  the token as CBOR
  637.      *
  638.      * @return  the claims of the reference token
  639.      * @throws AceException
  640.      * @throws IntrospectionException
  641.      */
  642.     protected synchronized Map<Short, CBORObject> processReferenceToken(CBORObject token)
  643.                 throws AceException, IntrospectionException {
  644.         // This should be a CBOR String
  645.         if (token.getType() != CBORType.ByteString) {
  646.             throw new AceException("Reference Token processing error");
  647.         }
  648.        
  649.         // Try to introspect the token
  650.         if (this.intro == null) {
  651.             throw new AceException("Introspection handler not found");
  652.         }
  653.         Map<Short, CBORObject> params
  654.             = this.intro.getParams(token.GetByteString());        
  655.         if (params == null) {
  656.             params = new HashMap<>();
  657.             params.put(Constants.ACTIVE, CBORObject.False);
  658.         }
  659.        
  660.         return params;
  661.     }
  662.    
  663.     /**
  664.      * Handle exi claim, if present.
  665.      * This is done by internally translating it to a exp claim in sync with the local time.
  666.      *
  667.      * Additional checks are also performed, to ensure that the Sequence Number
  668.      * encoded in the 'cti' claim is strictly greater than the highest Sequence Number
  669.      * received by this Resource Server in Access Tokens that include the 'exi' claim.
  670.      *
  671.      * @param claims
  672.      *
  673.      * @return  It returns a positive integer if the Sequence Number is successfully extracted from the 'cti' claim
  674.      *          It returns a negative integer in the following cases:
  675.      *          -1 : the 'exi' claim is not present
  676.      *          -2 : the 'cti' claim is not present in the Access Token as a CBOR byte string
  677.      *          -3 : the 'cti' claim is present but it is not formatted as expected
  678.      *          -4 : the Sequence Number encoded in the 'cti' claim is not greater than the stored highest Sequence Number
  679.      */
  680.     private synchronized int handleExi(Map<Short, CBORObject> claims) {
  681.        
  682.         CBORObject exi = claims.get(Constants.EXI);
  683.         if (exi == null) {
  684.             return -1;
  685.         }
  686.        
  687.         // Determine the expiration time and add it to the Access Token as value of an 'exp' claim
  688.         Long now = this.time.getCurrentTime();
  689.         Long exp = now + exi.AsNumber().ToInt64Checked();
  690.         claims.put(Constants.EXP, CBORObject.FromObject(exp));
  691.        
  692.         // Check that the 'cti' claim is also present
  693.         CBORObject cticb = claims.get(Constants.CTI);
  694.         if (cticb == null || cticb.getType() != CBORType.ByteString) {
  695.             // The 'cti' claim is not included in the Access Token as a CBOR byte string.
  696.             return -2;
  697.         }
  698.        
  699.         // Retrieve the Sequence Number from the 'cti' claim
  700.         int seqNum = TokenRepository.getInstance().getExiSeqNumFromCti(cticb.GetByteString());
  701.        
  702.         if (seqNum < 0) {
  703.             // The 'cti' claim is malformed
  704.             return -3;
  705.         }        
  706.         if (seqNum <= TokenRepository.getInstance().getTopExiSequenceNumber()) {
  707.             // The Sequence Number encoded in the 'cti' claim is not greater than the stored highest Sequence Number
  708.             return -4;
  709.         }
  710.        
  711.         return seqNum;
  712.        
  713.     }
  714.    
  715.     /**
  716.      * Handle cnonce if required
  717.      * @throws AceException
  718.      */
  719.     private synchronized void handleCnonce(Map<Short, CBORObject> claims) throws AceException {
  720.         if (this.checkCnonce) {
  721.             CnonceHandler.getInstance().checkNonce(claims);
  722.         }
  723.     }
  724.    
  725.     @Override
  726.     public void close() throws AceException {
  727.         if (TokenRepository.getInstance() != null) {
  728.             TokenRepository.getInstance().close();
  729.         }      
  730.     }  
  731. }