/************************************************************** * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. * *************************************************************/ // MARKER(update_precomp.py): autogen include statement, do not remove #include "precompiled_xmlsecurity.hxx" #include #include "util.hxx" #include #include #include #include #include "xmlsecurity/baseencoding.hxx" #include #include using namespace ::com::sun::star; long denyVerifyHandler( void *, void * ) { return 0; } long startVerifyHandler( void *, void * ) { return QueryVerifySignature(); } int SAL_CALL main( int argc, char **argv ) { if( argc < 5 ) { fprintf( stderr, "Usage: %s []\n" , argv[0] ) ; return -1 ; } uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory(); rtl::OUString aSIGFileName = rtl::OUString::createFromAscii(argv[1]); rtl::OUString aSIGFileName2 = rtl::OUString::createFromAscii(argv[2]); rtl::OUString aXMLFileName = rtl::OUString::createFromAscii(argv[3]); rtl::OUString aBINFileName = rtl::OUString::createFromAscii(argv[4]); rtl::OUString aCryptoToken; if ( argc >= 7 ) aCryptoToken = rtl::OUString::createFromAscii(argv[6]); sal_Int32 nSecurityId; uno::Reference< io::XOutputStream > xOutputStream; uno::Reference< io::XInputStream > xInputStream; bool bDone; SignatureInformations signatureInformations; uno::Reference< ::com::sun::star::xml::sax::XDocumentHandler> xDocumentHandler; // -------- START ------- XMLSignatureHelper aSignatureHelper( xMSF ); bool bInit = aSignatureHelper.Init( aCryptoToken ); if ( !bInit ) { fprintf( stderr, "Error initializing security context!\n" ); return -1; } fprintf( stdout, "\n\nTEST MISSION 1: Create the first signature file\n"); aSignatureHelper.StartMission(); /* * select a private key certificate */ uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnvironment = aSignatureHelper.GetSecurityEnvironment(); uno::Sequence< uno::Reference< ::com::sun::star::security::XCertificate > > xPersonalCerts = xSecurityEnvironment->getPersonalCertificates() ; fprintf( stdout, "\nPlease select two certificates:\n" ); for ( int nSig = 0; nSig < 2; nSig++ ) { // New security ID for signature... nSecurityId = aSignatureHelper.GetNewSecurityId(); // Select certificate... uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); aSignatureHelper.SetX509Certificate( nSecurityId, xPersonalCert->getIssuerName(), bigIntegerToNumericString( xPersonalCert->getSerialNumber()), baseEncode(xPersonalCert->getEncoded(), BASE64)); aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); } /* * creates signature */ xOutputStream = OpenOutputStream( aSIGFileName ); bDone = aSignatureHelper.CreateAndWriteSignature( xOutputStream ); if ( !bDone ) fprintf( stderr, "\nSTATUS MISSION 1: Error creating Signature!\n" ); else fprintf( stdout, "\nSTATUS MISSION 1: Signature successfully created!\n" ); aSignatureHelper.EndMission(); fprintf( stdout, "\n\nTEST MISSION 2: Transfer the second signature to a new signature file\n"); /* * You can use an uninitialized SignatureHelper to perform this mission. */ /* * configures the start-verify handler. Don't need to verify for transfering... */ aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, denyVerifyHandler ) ); aSignatureHelper.StartMission(); xInputStream = OpenInputStream( aSIGFileName ); bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); xInputStream->closeInput(); if ( !bDone ) fprintf( stderr, "\nSTATUS MISSION 2: Error in reading Signature!\n" ); else fprintf( stdout, "\nSTATUS MISSION 2: Signature successfully transfered!\n" ); /* * get all signature information */ signatureInformations = aSignatureHelper.GetSignatureInformations(); /* * write the first signature into the second signature file. */ xOutputStream = OpenOutputStream( aSIGFileName2 ); xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); aSignatureHelper.CloseDocumentHandler( xDocumentHandler); aSignatureHelper.EndMission(); fprintf( stdout, "\n\nTEST MISSION 3: Insert a new signature to the first signature file\n"); aSignatureHelper.StartMission(); nSecurityId = aSignatureHelper.GetNewSecurityId(); // Select certificate... uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); aSignatureHelper.SetX509Certificate( nSecurityId, xPersonalCert->getIssuerName(), bigIntegerToNumericString( xPersonalCert->getSerialNumber()), baseEncode(xPersonalCert->getEncoded(), BASE64)); aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); xOutputStream = OpenOutputStream( aSIGFileName ); xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[0]); bDone = aSignatureHelper.CreateAndWriteSignature( xDocumentHandler ); aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); aSignatureHelper.CloseDocumentHandler( xDocumentHandler); if ( !bDone ) fprintf( stderr, "\nSTATUS MISSION 3: Error creating Signature!\n" ); else fprintf( stdout, "\nSTATUS MISSION 3: Signature successfully created!\n" ); aSignatureHelper.EndMission(); fprintf( stdout, "\n\nTEST MISSION 4 : Verify the first signature file\n"); aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, startVerifyHandler ) ); aSignatureHelper.StartMission(); xInputStream = OpenInputStream( aSIGFileName ); bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); xInputStream->closeInput(); if ( !bDone ) fprintf( stderr, "\nSTATUS MISSION 4: Error verifying Signatures!\n" ); else fprintf( stdout, "\nSTATUS MISSION 4: All choosen Signatures veryfied successfully!\n" ); aSignatureHelper.EndMission(); QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); fprintf( stdout, "\n\nTEST MISSION 5: Verify the second signature file\n"); aSignatureHelper.StartMission(); xInputStream = OpenInputStream( aSIGFileName2 ); bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); xInputStream->closeInput(); if ( !bDone ) fprintf( stderr, "\nSTATUS MISSION 5: Error verifying Signatures!\n" ); else fprintf( stdout, "\nSTATUS MISSION 5: All choosen Signatures veryfied successfully!\n" ); aSignatureHelper.EndMission(); QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); return 0; }