1*b1cdbd2cSJim Jagielski /**************************************************************
2*b1cdbd2cSJim Jagielski *
3*b1cdbd2cSJim Jagielski * Licensed to the Apache Software Foundation (ASF) under one
4*b1cdbd2cSJim Jagielski * or more contributor license agreements. See the NOTICE file
5*b1cdbd2cSJim Jagielski * distributed with this work for additional information
6*b1cdbd2cSJim Jagielski * regarding copyright ownership. The ASF licenses this file
7*b1cdbd2cSJim Jagielski * to you under the Apache License, Version 2.0 (the
8*b1cdbd2cSJim Jagielski * "License"); you may not use this file except in compliance
9*b1cdbd2cSJim Jagielski * with the License. You may obtain a copy of the License at
10*b1cdbd2cSJim Jagielski *
11*b1cdbd2cSJim Jagielski * http://www.apache.org/licenses/LICENSE-2.0
12*b1cdbd2cSJim Jagielski *
13*b1cdbd2cSJim Jagielski * Unless required by applicable law or agreed to in writing,
14*b1cdbd2cSJim Jagielski * software distributed under the License is distributed on an
15*b1cdbd2cSJim Jagielski * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16*b1cdbd2cSJim Jagielski * KIND, either express or implied. See the License for the
17*b1cdbd2cSJim Jagielski * specific language governing permissions and limitations
18*b1cdbd2cSJim Jagielski * under the License.
19*b1cdbd2cSJim Jagielski *
20*b1cdbd2cSJim Jagielski *************************************************************/
21*b1cdbd2cSJim Jagielski
22*b1cdbd2cSJim Jagielski
23*b1cdbd2cSJim Jagielski
24*b1cdbd2cSJim Jagielski // MARKER(update_precomp.py): autogen include statement, do not remove
25*b1cdbd2cSJim Jagielski #include "precompiled_xmlsecurity.hxx"
26*b1cdbd2cSJim Jagielski
27*b1cdbd2cSJim Jagielski #include <xsecctl.hxx>
28*b1cdbd2cSJim Jagielski #include <tools/debug.hxx>
29*b1cdbd2cSJim Jagielski
30*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/XKeyCollector.hpp>
31*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/ElementMarkPriority.hpp>
32*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/XReferenceResolvedBroadcaster.hpp>
33*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/XBlockerMonitor.hpp>
34*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/XReferenceCollector.hpp>
35*b1cdbd2cSJim Jagielski #include <com/sun/star/xml/crypto/sax/XSignatureCreationResultBroadcaster.hpp>
36*b1cdbd2cSJim Jagielski #include <com/sun/star/io/XActiveDataSource.hpp>
37*b1cdbd2cSJim Jagielski #include <rtl/uuid.h>
38*b1cdbd2cSJim Jagielski
39*b1cdbd2cSJim Jagielski #include <stdio.h>
40*b1cdbd2cSJim Jagielski
41*b1cdbd2cSJim Jagielski namespace cssu = com::sun::star::uno;
42*b1cdbd2cSJim Jagielski namespace cssl = com::sun::star::lang;
43*b1cdbd2cSJim Jagielski namespace cssxc = com::sun::star::xml::crypto;
44*b1cdbd2cSJim Jagielski namespace cssxs = com::sun::star::xml::sax;
45*b1cdbd2cSJim Jagielski
46*b1cdbd2cSJim Jagielski /* xml security framework components */
47*b1cdbd2cSJim Jagielski #define SIGNATURECREATOR_COMPONENT "com.sun.star.xml.crypto.sax.SignatureCreator"
48*b1cdbd2cSJim Jagielski
49*b1cdbd2cSJim Jagielski /* protected: for signature generation */
createId()50*b1cdbd2cSJim Jagielski rtl::OUString XSecController::createId()
51*b1cdbd2cSJim Jagielski {
52*b1cdbd2cSJim Jagielski cssu::Sequence< sal_Int8 > aSeq( 16 );
53*b1cdbd2cSJim Jagielski rtl_createUuid ((sal_uInt8 *)aSeq.getArray(), 0, sal_True);
54*b1cdbd2cSJim Jagielski
55*b1cdbd2cSJim Jagielski char str[68]="ID_";
56*b1cdbd2cSJim Jagielski int length = 3;
57*b1cdbd2cSJim Jagielski for (int i=0; i<16; ++i)
58*b1cdbd2cSJim Jagielski {
59*b1cdbd2cSJim Jagielski length += sprintf(str+length, "%04x", (unsigned char)aSeq[i]);
60*b1cdbd2cSJim Jagielski }
61*b1cdbd2cSJim Jagielski
62*b1cdbd2cSJim Jagielski return rtl::OUString::createFromAscii(str);
63*b1cdbd2cSJim Jagielski }
64*b1cdbd2cSJim Jagielski
prepareSignatureToWrite(InternalSignatureInformation & internalSignatureInfor)65*b1cdbd2cSJim Jagielski cssu::Reference< cssxc::sax::XReferenceResolvedListener > XSecController::prepareSignatureToWrite(
66*b1cdbd2cSJim Jagielski InternalSignatureInformation& internalSignatureInfor )
67*b1cdbd2cSJim Jagielski {
68*b1cdbd2cSJim Jagielski sal_Int32 nSecurityId = internalSignatureInfor.signatureInfor.nSecurityId;
69*b1cdbd2cSJim Jagielski SignatureReferenceInformations& vReferenceInfors = internalSignatureInfor.signatureInfor.vSignatureReferenceInfors;
70*b1cdbd2cSJim Jagielski
71*b1cdbd2cSJim Jagielski sal_Int32 nIdOfSignatureElementCollector;
72*b1cdbd2cSJim Jagielski cssu::Reference< cssxc::sax::XReferenceResolvedListener > xReferenceResolvedListener;
73*b1cdbd2cSJim Jagielski
74*b1cdbd2cSJim Jagielski nIdOfSignatureElementCollector =
75*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->addSecurityElementCollector( cssxc::sax::ElementMarkPriority_AFTERMODIFY, sal_True );
76*b1cdbd2cSJim Jagielski
77*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->setSecurityId(nIdOfSignatureElementCollector, nSecurityId);
78*b1cdbd2cSJim Jagielski
79*b1cdbd2cSJim Jagielski /*
80*b1cdbd2cSJim Jagielski * create a SignatureCreator
81*b1cdbd2cSJim Jagielski */
82*b1cdbd2cSJim Jagielski cssu::Reference< cssl::XMultiComponentFactory > xMCF( mxCtx->getServiceManager() );
83*b1cdbd2cSJim Jagielski xReferenceResolvedListener = cssu::Reference< cssxc::sax::XReferenceResolvedListener >(
84*b1cdbd2cSJim Jagielski xMCF->createInstanceWithContext(
85*b1cdbd2cSJim Jagielski rtl::OUString::createFromAscii(SIGNATURECREATOR_COMPONENT), mxCtx),
86*b1cdbd2cSJim Jagielski cssu::UNO_QUERY);
87*b1cdbd2cSJim Jagielski
88*b1cdbd2cSJim Jagielski cssu::Reference<cssl::XInitialization> xInitialization(xReferenceResolvedListener, cssu::UNO_QUERY);
89*b1cdbd2cSJim Jagielski
90*b1cdbd2cSJim Jagielski cssu::Sequence<cssu::Any> args(5);
91*b1cdbd2cSJim Jagielski args[0] = cssu::makeAny(rtl::OUString::valueOf(nSecurityId));
92*b1cdbd2cSJim Jagielski args[1] = cssu::makeAny(m_xSAXEventKeeper);
93*b1cdbd2cSJim Jagielski args[2] = cssu::makeAny(rtl::OUString::valueOf(nIdOfSignatureElementCollector));
94*b1cdbd2cSJim Jagielski
95*b1cdbd2cSJim Jagielski //i39448 : for nss, the internal module is used for signing, which needs to be improved later
96*b1cdbd2cSJim Jagielski sal_Int32 nEnvIndex = internalSignatureInfor.signatureInfor.nSecurityEnvironmentIndex;
97*b1cdbd2cSJim Jagielski if( nEnvIndex < 0 || nEnvIndex >= m_xSecurityContext->getSecurityEnvironmentNumber())
98*b1cdbd2cSJim Jagielski {// set defaultEnv
99*b1cdbd2cSJim Jagielski args[3] = cssu::makeAny(m_xSecurityContext->getSecurityEnvironment());
100*b1cdbd2cSJim Jagielski }
101*b1cdbd2cSJim Jagielski else
102*b1cdbd2cSJim Jagielski {
103*b1cdbd2cSJim Jagielski args[3] = cssu::makeAny(m_xSecurityContext->getSecurityEnvironmentByIndex(nEnvIndex));
104*b1cdbd2cSJim Jagielski }
105*b1cdbd2cSJim Jagielski
106*b1cdbd2cSJim Jagielski args[4] = cssu::makeAny(m_xXMLSignature);
107*b1cdbd2cSJim Jagielski xInitialization->initialize(args);
108*b1cdbd2cSJim Jagielski
109*b1cdbd2cSJim Jagielski sal_Int32 nBlockerId = m_xSAXEventKeeper->addBlocker();
110*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->setSecurityId(nBlockerId, nSecurityId);
111*b1cdbd2cSJim Jagielski
112*b1cdbd2cSJim Jagielski cssu::Reference<cssxc::sax::XBlockerMonitor> xBlockerMonitor(xReferenceResolvedListener, cssu::UNO_QUERY);
113*b1cdbd2cSJim Jagielski xBlockerMonitor->setBlockerId(nBlockerId);
114*b1cdbd2cSJim Jagielski
115*b1cdbd2cSJim Jagielski cssu::Reference< cssxc::sax::XSignatureCreationResultBroadcaster >
116*b1cdbd2cSJim Jagielski xSignatureCreationResultBroadcaster(xReferenceResolvedListener, cssu::UNO_QUERY);
117*b1cdbd2cSJim Jagielski
118*b1cdbd2cSJim Jagielski xSignatureCreationResultBroadcaster->addSignatureCreationResultListener( this );
119*b1cdbd2cSJim Jagielski
120*b1cdbd2cSJim Jagielski cssu::Reference<cssxc::sax::XReferenceResolvedBroadcaster>
121*b1cdbd2cSJim Jagielski xReferenceResolvedBroadcaster
122*b1cdbd2cSJim Jagielski (m_xSAXEventKeeper,
123*b1cdbd2cSJim Jagielski cssu::UNO_QUERY);
124*b1cdbd2cSJim Jagielski
125*b1cdbd2cSJim Jagielski xReferenceResolvedBroadcaster->addReferenceResolvedListener(
126*b1cdbd2cSJim Jagielski nIdOfSignatureElementCollector,
127*b1cdbd2cSJim Jagielski xReferenceResolvedListener);
128*b1cdbd2cSJim Jagielski
129*b1cdbd2cSJim Jagielski cssu::Reference<cssxc::sax::XReferenceCollector> xReferenceCollector
130*b1cdbd2cSJim Jagielski (xReferenceResolvedListener, cssu::UNO_QUERY);
131*b1cdbd2cSJim Jagielski
132*b1cdbd2cSJim Jagielski int i;
133*b1cdbd2cSJim Jagielski int size = vReferenceInfors.size();
134*b1cdbd2cSJim Jagielski sal_Int32 nReferenceCount = 0;
135*b1cdbd2cSJim Jagielski
136*b1cdbd2cSJim Jagielski for(i=0; i<size; ++i)
137*b1cdbd2cSJim Jagielski {
138*b1cdbd2cSJim Jagielski sal_Int32 keeperId = internalSignatureInfor.vKeeperIds[i];
139*b1cdbd2cSJim Jagielski
140*b1cdbd2cSJim Jagielski if ( keeperId != -1)
141*b1cdbd2cSJim Jagielski {
142*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->setSecurityId(keeperId, nSecurityId);
143*b1cdbd2cSJim Jagielski xReferenceResolvedBroadcaster->addReferenceResolvedListener( keeperId, xReferenceResolvedListener);
144*b1cdbd2cSJim Jagielski xReferenceCollector->setReferenceId( keeperId );
145*b1cdbd2cSJim Jagielski nReferenceCount++;
146*b1cdbd2cSJim Jagielski }
147*b1cdbd2cSJim Jagielski }
148*b1cdbd2cSJim Jagielski
149*b1cdbd2cSJim Jagielski xReferenceCollector->setReferenceCount( nReferenceCount );
150*b1cdbd2cSJim Jagielski
151*b1cdbd2cSJim Jagielski /*
152*b1cdbd2cSJim Jagielski * adds all URI binding
153*b1cdbd2cSJim Jagielski */
154*b1cdbd2cSJim Jagielski cssu::Reference<cssxc::XUriBinding> xUriBinding
155*b1cdbd2cSJim Jagielski (xReferenceResolvedListener, cssu::UNO_QUERY);
156*b1cdbd2cSJim Jagielski
157*b1cdbd2cSJim Jagielski for(i=0; i<size; ++i)
158*b1cdbd2cSJim Jagielski {
159*b1cdbd2cSJim Jagielski const SignatureReferenceInformation& refInfor = vReferenceInfors[i];
160*b1cdbd2cSJim Jagielski
161*b1cdbd2cSJim Jagielski cssu::Reference< com::sun::star::io::XInputStream > xInputStream
162*b1cdbd2cSJim Jagielski = getObjectInputStream( refInfor.ouURI );
163*b1cdbd2cSJim Jagielski
164*b1cdbd2cSJim Jagielski if (xInputStream.is())
165*b1cdbd2cSJim Jagielski {
166*b1cdbd2cSJim Jagielski xUriBinding->setUriBinding(refInfor.ouURI,xInputStream);
167*b1cdbd2cSJim Jagielski }
168*b1cdbd2cSJim Jagielski }
169*b1cdbd2cSJim Jagielski
170*b1cdbd2cSJim Jagielski cssu::Reference<cssxc::sax::XKeyCollector> keyCollector (xReferenceResolvedListener, cssu::UNO_QUERY);
171*b1cdbd2cSJim Jagielski keyCollector->setKeyId(0);
172*b1cdbd2cSJim Jagielski
173*b1cdbd2cSJim Jagielski internalSignatureInfor.signatureInfor.ouSignatureId = createId();
174*b1cdbd2cSJim Jagielski internalSignatureInfor.signatureInfor.ouPropertyId = createId();
175*b1cdbd2cSJim Jagielski internalSignatureInfor.addReference(TYPE_SAMEDOCUMENT_REFERENCE, internalSignatureInfor.signatureInfor.ouPropertyId, -1 );
176*b1cdbd2cSJim Jagielski size++;
177*b1cdbd2cSJim Jagielski
178*b1cdbd2cSJim Jagielski /*
179*b1cdbd2cSJim Jagielski * replace both digestValues and signatueValue to " "
180*b1cdbd2cSJim Jagielski */
181*b1cdbd2cSJim Jagielski for(i=0; i<size; ++i)
182*b1cdbd2cSJim Jagielski {
183*b1cdbd2cSJim Jagielski SignatureReferenceInformation& refInfor = vReferenceInfors[i];
184*b1cdbd2cSJim Jagielski refInfor.ouDigestValue = rtl::OUString(RTL_CONSTASCII_USTRINGPARAM(CHAR_BLANK));
185*b1cdbd2cSJim Jagielski }
186*b1cdbd2cSJim Jagielski
187*b1cdbd2cSJim Jagielski internalSignatureInfor.signatureInfor.ouSignatureValue = rtl::OUString(RTL_CONSTASCII_USTRINGPARAM(CHAR_BLANK));
188*b1cdbd2cSJim Jagielski
189*b1cdbd2cSJim Jagielski return xReferenceResolvedListener;
190*b1cdbd2cSJim Jagielski }
191*b1cdbd2cSJim Jagielski
192*b1cdbd2cSJim Jagielski /* public: for signature generation */
collectToSign(sal_Int32 securityId,const rtl::OUString & referenceId)193*b1cdbd2cSJim Jagielski void XSecController::collectToSign( sal_Int32 securityId, const rtl::OUString& referenceId )
194*b1cdbd2cSJim Jagielski {
195*b1cdbd2cSJim Jagielski /* DBG_ASSERT( m_xSAXEventKeeper.is(), "the SAXEventKeeper is NULL" ); */
196*b1cdbd2cSJim Jagielski
197*b1cdbd2cSJim Jagielski chainOn(true);
198*b1cdbd2cSJim Jagielski
199*b1cdbd2cSJim Jagielski if ( m_nStatusOfSecurityComponents == INITIALIZED )
200*b1cdbd2cSJim Jagielski /*
201*b1cdbd2cSJim Jagielski * if all security components are ready, add a signature.
202*b1cdbd2cSJim Jagielski */
203*b1cdbd2cSJim Jagielski {
204*b1cdbd2cSJim Jagielski sal_Int32 nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector(
205*b1cdbd2cSJim Jagielski cssxc::sax::ElementMarkPriority_AFTERMODIFY, sal_False);
206*b1cdbd2cSJim Jagielski
207*b1cdbd2cSJim Jagielski int index = findSignatureInfor( securityId );
208*b1cdbd2cSJim Jagielski
209*b1cdbd2cSJim Jagielski if ( index == -1 )
210*b1cdbd2cSJim Jagielski {
211*b1cdbd2cSJim Jagielski InternalSignatureInformation isi(securityId, NULL);
212*b1cdbd2cSJim Jagielski isi.addReference(TYPE_SAMEDOCUMENT_REFERENCE, referenceId, nKeeperId );
213*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations.push_back( isi );
214*b1cdbd2cSJim Jagielski }
215*b1cdbd2cSJim Jagielski else
216*b1cdbd2cSJim Jagielski {
217*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations[index].addReference(TYPE_SAMEDOCUMENT_REFERENCE, referenceId, nKeeperId );
218*b1cdbd2cSJim Jagielski }
219*b1cdbd2cSJim Jagielski }
220*b1cdbd2cSJim Jagielski }
221*b1cdbd2cSJim Jagielski
signAStream(sal_Int32 securityId,const rtl::OUString & uri,const rtl::OUString &,sal_Bool isBinary)222*b1cdbd2cSJim Jagielski void XSecController::signAStream( sal_Int32 securityId, const rtl::OUString& uri, const rtl::OUString& /*objectURL*/, sal_Bool isBinary)
223*b1cdbd2cSJim Jagielski {
224*b1cdbd2cSJim Jagielski sal_Int32 type = ((isBinary==sal_True)?TYPE_BINARYSTREAM_REFERENCE:TYPE_XMLSTREAM_REFERENCE);
225*b1cdbd2cSJim Jagielski
226*b1cdbd2cSJim Jagielski int index = findSignatureInfor( securityId );
227*b1cdbd2cSJim Jagielski
228*b1cdbd2cSJim Jagielski if (index == -1)
229*b1cdbd2cSJim Jagielski {
230*b1cdbd2cSJim Jagielski InternalSignatureInformation isi(securityId, NULL);
231*b1cdbd2cSJim Jagielski isi.addReference(type, uri, -1);
232*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations.push_back( isi );
233*b1cdbd2cSJim Jagielski }
234*b1cdbd2cSJim Jagielski else
235*b1cdbd2cSJim Jagielski {
236*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations[index].addReference(type, uri, -1);
237*b1cdbd2cSJim Jagielski }
238*b1cdbd2cSJim Jagielski }
239*b1cdbd2cSJim Jagielski
setX509Certificate(sal_Int32 nSecurityId,const rtl::OUString & ouX509IssuerName,const rtl::OUString & ouX509SerialNumber,const rtl::OUString & ouX509Cert)240*b1cdbd2cSJim Jagielski void XSecController::setX509Certificate(
241*b1cdbd2cSJim Jagielski sal_Int32 nSecurityId,
242*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509IssuerName,
243*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509SerialNumber,
244*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509Cert)
245*b1cdbd2cSJim Jagielski {
246*b1cdbd2cSJim Jagielski setX509Certificate(nSecurityId, -1, ouX509IssuerName, ouX509SerialNumber, ouX509Cert);
247*b1cdbd2cSJim Jagielski }
248*b1cdbd2cSJim Jagielski
setX509Certificate(sal_Int32 nSecurityId,const sal_Int32 nSecurityEnvironmentIndex,const rtl::OUString & ouX509IssuerName,const rtl::OUString & ouX509SerialNumber,const rtl::OUString & ouX509Cert)249*b1cdbd2cSJim Jagielski void XSecController::setX509Certificate(
250*b1cdbd2cSJim Jagielski sal_Int32 nSecurityId,
251*b1cdbd2cSJim Jagielski const sal_Int32 nSecurityEnvironmentIndex,
252*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509IssuerName,
253*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509SerialNumber,
254*b1cdbd2cSJim Jagielski const rtl::OUString& ouX509Cert)
255*b1cdbd2cSJim Jagielski {
256*b1cdbd2cSJim Jagielski int index = findSignatureInfor( nSecurityId );
257*b1cdbd2cSJim Jagielski
258*b1cdbd2cSJim Jagielski if ( index == -1 )
259*b1cdbd2cSJim Jagielski {
260*b1cdbd2cSJim Jagielski InternalSignatureInformation isi(nSecurityId, NULL);
261*b1cdbd2cSJim Jagielski isi.signatureInfor.nSecurityEnvironmentIndex = nSecurityEnvironmentIndex;
262*b1cdbd2cSJim Jagielski isi.signatureInfor.ouX509IssuerName = ouX509IssuerName;
263*b1cdbd2cSJim Jagielski isi.signatureInfor.ouX509SerialNumber = ouX509SerialNumber;
264*b1cdbd2cSJim Jagielski isi.signatureInfor.ouX509Certificate = ouX509Cert;
265*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations.push_back( isi );
266*b1cdbd2cSJim Jagielski }
267*b1cdbd2cSJim Jagielski else
268*b1cdbd2cSJim Jagielski {
269*b1cdbd2cSJim Jagielski SignatureInformation &si
270*b1cdbd2cSJim Jagielski = m_vInternalSignatureInformations[index].signatureInfor;
271*b1cdbd2cSJim Jagielski si.ouX509IssuerName = ouX509IssuerName;
272*b1cdbd2cSJim Jagielski si.ouX509SerialNumber = ouX509SerialNumber;
273*b1cdbd2cSJim Jagielski si.ouX509Certificate = ouX509Cert;
274*b1cdbd2cSJim Jagielski si.nSecurityEnvironmentIndex = nSecurityEnvironmentIndex;
275*b1cdbd2cSJim Jagielski }
276*b1cdbd2cSJim Jagielski }
277*b1cdbd2cSJim Jagielski
setDate(sal_Int32 nSecurityId,const::com::sun::star::util::DateTime & rDateTime)278*b1cdbd2cSJim Jagielski void XSecController::setDate(
279*b1cdbd2cSJim Jagielski sal_Int32 nSecurityId,
280*b1cdbd2cSJim Jagielski const ::com::sun::star::util::DateTime& rDateTime )
281*b1cdbd2cSJim Jagielski {
282*b1cdbd2cSJim Jagielski int index = findSignatureInfor( nSecurityId );
283*b1cdbd2cSJim Jagielski
284*b1cdbd2cSJim Jagielski if ( index == -1 )
285*b1cdbd2cSJim Jagielski {
286*b1cdbd2cSJim Jagielski InternalSignatureInformation isi(nSecurityId, NULL);
287*b1cdbd2cSJim Jagielski isi.signatureInfor.stDateTime = rDateTime;
288*b1cdbd2cSJim Jagielski m_vInternalSignatureInformations.push_back( isi );
289*b1cdbd2cSJim Jagielski }
290*b1cdbd2cSJim Jagielski else
291*b1cdbd2cSJim Jagielski {
292*b1cdbd2cSJim Jagielski SignatureInformation &si
293*b1cdbd2cSJim Jagielski = m_vInternalSignatureInformations[index].signatureInfor;
294*b1cdbd2cSJim Jagielski si.stDateTime = rDateTime;
295*b1cdbd2cSJim Jagielski }
296*b1cdbd2cSJim Jagielski }
297*b1cdbd2cSJim Jagielski
WriteSignature(const cssu::Reference<cssxs::XDocumentHandler> & xDocumentHandler)298*b1cdbd2cSJim Jagielski bool XSecController::WriteSignature(
299*b1cdbd2cSJim Jagielski const cssu::Reference<cssxs::XDocumentHandler>& xDocumentHandler )
300*b1cdbd2cSJim Jagielski {
301*b1cdbd2cSJim Jagielski bool rc = false;
302*b1cdbd2cSJim Jagielski
303*b1cdbd2cSJim Jagielski DBG_ASSERT( xDocumentHandler.is(), "I really need a document handler!" );
304*b1cdbd2cSJim Jagielski
305*b1cdbd2cSJim Jagielski /*
306*b1cdbd2cSJim Jagielski * chain the SAXEventKeeper to the SAX chain
307*b1cdbd2cSJim Jagielski */
308*b1cdbd2cSJim Jagielski chainOn(true);
309*b1cdbd2cSJim Jagielski
310*b1cdbd2cSJim Jagielski if ( m_nStatusOfSecurityComponents == INITIALIZED )
311*b1cdbd2cSJim Jagielski /*
312*b1cdbd2cSJim Jagielski * if all security components are ready, add the signature
313*b1cdbd2cSJim Jagielski * stream.
314*b1cdbd2cSJim Jagielski */
315*b1cdbd2cSJim Jagielski {
316*b1cdbd2cSJim Jagielski m_bIsSAXEventKeeperSticky = true;
317*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->setNextHandler(xDocumentHandler);
318*b1cdbd2cSJim Jagielski
319*b1cdbd2cSJim Jagielski try
320*b1cdbd2cSJim Jagielski {
321*b1cdbd2cSJim Jagielski /*
322*b1cdbd2cSJim Jagielski * export the signature template
323*b1cdbd2cSJim Jagielski */
324*b1cdbd2cSJim Jagielski cssu::Reference<cssxs::XDocumentHandler> xSEKHandler( m_xSAXEventKeeper,cssu::UNO_QUERY);
325*b1cdbd2cSJim Jagielski
326*b1cdbd2cSJim Jagielski int i;
327*b1cdbd2cSJim Jagielski int sigNum = m_vInternalSignatureInformations.size();
328*b1cdbd2cSJim Jagielski
329*b1cdbd2cSJim Jagielski for (i=0; i<sigNum; ++i)
330*b1cdbd2cSJim Jagielski {
331*b1cdbd2cSJim Jagielski InternalSignatureInformation &isi = m_vInternalSignatureInformations[i];
332*b1cdbd2cSJim Jagielski
333*b1cdbd2cSJim Jagielski /*
334*b1cdbd2cSJim Jagielski * prepare the signature creator
335*b1cdbd2cSJim Jagielski */
336*b1cdbd2cSJim Jagielski isi.xReferenceResolvedListener
337*b1cdbd2cSJim Jagielski = prepareSignatureToWrite( isi );
338*b1cdbd2cSJim Jagielski
339*b1cdbd2cSJim Jagielski exportSignature( xSEKHandler, isi.signatureInfor );
340*b1cdbd2cSJim Jagielski }
341*b1cdbd2cSJim Jagielski
342*b1cdbd2cSJim Jagielski m_bIsSAXEventKeeperSticky = false;
343*b1cdbd2cSJim Jagielski chainOff();
344*b1cdbd2cSJim Jagielski
345*b1cdbd2cSJim Jagielski rc = true;
346*b1cdbd2cSJim Jagielski }
347*b1cdbd2cSJim Jagielski catch( cssxs::SAXException& )
348*b1cdbd2cSJim Jagielski {
349*b1cdbd2cSJim Jagielski m_pErrorMessage = ERROR_SAXEXCEPTIONDURINGCREATION;
350*b1cdbd2cSJim Jagielski }
351*b1cdbd2cSJim Jagielski catch( com::sun::star::io::IOException& )
352*b1cdbd2cSJim Jagielski {
353*b1cdbd2cSJim Jagielski m_pErrorMessage = ERROR_IOEXCEPTIONDURINGCREATION;
354*b1cdbd2cSJim Jagielski }
355*b1cdbd2cSJim Jagielski catch( cssu::Exception& )
356*b1cdbd2cSJim Jagielski {
357*b1cdbd2cSJim Jagielski m_pErrorMessage = ERROR_EXCEPTIONDURINGCREATION;
358*b1cdbd2cSJim Jagielski }
359*b1cdbd2cSJim Jagielski
360*b1cdbd2cSJim Jagielski m_xSAXEventKeeper->setNextHandler( NULL );
361*b1cdbd2cSJim Jagielski m_bIsSAXEventKeeperSticky = false;
362*b1cdbd2cSJim Jagielski }
363*b1cdbd2cSJim Jagielski else
364*b1cdbd2cSJim Jagielski {
365*b1cdbd2cSJim Jagielski m_pErrorMessage = ERROR_CANNOTCREATEXMLSECURITYCOMPONENT;
366*b1cdbd2cSJim Jagielski }
367*b1cdbd2cSJim Jagielski
368*b1cdbd2cSJim Jagielski return rc;
369*b1cdbd2cSJim Jagielski }
370*b1cdbd2cSJim Jagielski
371