1*b1cdbd2cSJim Jagielski /**************************************************************
2*b1cdbd2cSJim Jagielski  *
3*b1cdbd2cSJim Jagielski  * Licensed to the Apache Software Foundation (ASF) under one
4*b1cdbd2cSJim Jagielski  * or more contributor license agreements.  See the NOTICE file
5*b1cdbd2cSJim Jagielski  * distributed with this work for additional information
6*b1cdbd2cSJim Jagielski  * regarding copyright ownership.  The ASF licenses this file
7*b1cdbd2cSJim Jagielski  * to you under the Apache License, Version 2.0 (the
8*b1cdbd2cSJim Jagielski  * "License"); you may not use this file except in compliance
9*b1cdbd2cSJim Jagielski  * with the License.  You may obtain a copy of the License at
10*b1cdbd2cSJim Jagielski  *
11*b1cdbd2cSJim Jagielski  *   http://www.apache.org/licenses/LICENSE-2.0
12*b1cdbd2cSJim Jagielski  *
13*b1cdbd2cSJim Jagielski  * Unless required by applicable law or agreed to in writing,
14*b1cdbd2cSJim Jagielski  * software distributed under the License is distributed on an
15*b1cdbd2cSJim Jagielski  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16*b1cdbd2cSJim Jagielski  * KIND, either express or implied.  See the License for the
17*b1cdbd2cSJim Jagielski  * specific language governing permissions and limitations
18*b1cdbd2cSJim Jagielski  * under the License.
19*b1cdbd2cSJim Jagielski  *
20*b1cdbd2cSJim Jagielski  *************************************************************/
21*b1cdbd2cSJim Jagielski 
22*b1cdbd2cSJim Jagielski /** -- C++ Source File -- **/
23*b1cdbd2cSJim Jagielski 
24*b1cdbd2cSJim Jagielski // MARKER(update_precomp.py): autogen include statement, do not remove
25*b1cdbd2cSJim Jagielski #include "precompiled_xmlsecurity.hxx"
26*b1cdbd2cSJim Jagielski #include <stdio.h>
27*b1cdbd2cSJim Jagielski #include "helper.hxx"
28*b1cdbd2cSJim Jagielski 
29*b1cdbd2cSJim Jagielski #include "libxml/tree.h"
30*b1cdbd2cSJim Jagielski #include "libxml/parser.h"
31*b1cdbd2cSJim Jagielski #ifndef XMLSEC_NO_XSLT
32*b1cdbd2cSJim Jagielski #include "libxslt/xslt.h"
33*b1cdbd2cSJim Jagielski #endif
34*b1cdbd2cSJim Jagielski 
35*b1cdbd2cSJim Jagielski #include "securityenvironment_mscryptimpl.hxx"
36*b1cdbd2cSJim Jagielski 
37*b1cdbd2cSJim Jagielski #include <xmlsecurity/biginteger.hxx>
38*b1cdbd2cSJim Jagielski 
39*b1cdbd2cSJim Jagielski #include "xmlsec/strings.h"
40*b1cdbd2cSJim Jagielski #include "xmlsec/xmltree.h"
41*b1cdbd2cSJim Jagielski #include "xmlsec/mscrypto/app.h"
42*b1cdbd2cSJim Jagielski 
43*b1cdbd2cSJim Jagielski #include <rtl/ustring.hxx>
44*b1cdbd2cSJim Jagielski 
45*b1cdbd2cSJim Jagielski using namespace ::rtl ;
46*b1cdbd2cSJim Jagielski using namespace ::cppu ;
47*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::uno ;
48*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::io ;
49*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::ucb ;
50*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::beans ;
51*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::document ;
52*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::lang ;
53*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::security ;
54*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::xml::wrapper ;
55*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::xml::crypto ;
56*b1cdbd2cSJim Jagielski 
main(int argc,char ** argv)57*b1cdbd2cSJim Jagielski int SAL_CALL main( int argc, char **argv )
58*b1cdbd2cSJim Jagielski {
59*b1cdbd2cSJim Jagielski 	const char* n_pCertStore ;
60*b1cdbd2cSJim Jagielski 	HCERTSTORE n_hStoreHandle ;
61*b1cdbd2cSJim Jagielski 
62*b1cdbd2cSJim Jagielski 	if( argc != 3 && argc != 2 ) {
63*b1cdbd2cSJim Jagielski 		fprintf( stderr, "Usage: %s <rdb file>\n" , argv[0] ) ;
64*b1cdbd2cSJim Jagielski 		fprintf( stderr, "Or: \t%s <rdb file> < Cert Store Name >\n\n" , argv[0] ) ;
65*b1cdbd2cSJim Jagielski 		return 1 ;
66*b1cdbd2cSJim Jagielski 	}
67*b1cdbd2cSJim Jagielski 
68*b1cdbd2cSJim Jagielski 	//Initialize the crypto engine
69*b1cdbd2cSJim Jagielski 	if( argc == 3 ) {
70*b1cdbd2cSJim Jagielski 		n_pCertStore = argv[2] ;
71*b1cdbd2cSJim Jagielski 		n_hStoreHandle = CertOpenSystemStore( NULL, n_pCertStore ) ;
72*b1cdbd2cSJim Jagielski 		if( n_hStoreHandle == NULL ) {
73*b1cdbd2cSJim Jagielski 			fprintf( stderr, "Can not open the system cert store %s\n", n_pCertStore ) ;
74*b1cdbd2cSJim Jagielski 			return 1 ;
75*b1cdbd2cSJim Jagielski 		}
76*b1cdbd2cSJim Jagielski 	} else {
77*b1cdbd2cSJim Jagielski 		n_pCertStore = NULL ;
78*b1cdbd2cSJim Jagielski 		n_hStoreHandle = NULL ;
79*b1cdbd2cSJim Jagielski 	}
80*b1cdbd2cSJim Jagielski 	//xmlSecMSCryptoAppInit( n_pCertStore ) ;
81*b1cdbd2cSJim Jagielski 
82*b1cdbd2cSJim Jagielski 	try {
83*b1cdbd2cSJim Jagielski 		Reference< XMultiComponentFactory > xManager = NULL ;
84*b1cdbd2cSJim Jagielski 		Reference< XComponentContext > xContext = NULL ;
85*b1cdbd2cSJim Jagielski 
86*b1cdbd2cSJim Jagielski 		xManager = serviceManager( xContext , OUString::createFromAscii( "local" ), OUString::createFromAscii( argv[1] ) ) ;
87*b1cdbd2cSJim Jagielski 		OSL_ENSURE( xManager.is() ,
88*b1cdbd2cSJim Jagielski 			"ServicesManager - "
89*b1cdbd2cSJim Jagielski 			"Cannot get service manager" ) ;
90*b1cdbd2cSJim Jagielski 
91*b1cdbd2cSJim Jagielski 		//Create security environment
92*b1cdbd2cSJim Jagielski 		//Build Security Environment
93*b1cdbd2cSJim Jagielski 		Reference< XInterface > xsecenv =
94*b1cdbd2cSJim Jagielski 			xManager->createInstanceWithContext( OUString::createFromAscii("com.sun.star.xml.security.bridge.xmlsec.SecurityEnvironment_MSCryptImpl"), xContext ) ;
95*b1cdbd2cSJim Jagielski 		OSL_ENSURE( xsecenv.is() ,
96*b1cdbd2cSJim Jagielski 			"Signer - "
97*b1cdbd2cSJim Jagielski 			"Cannot get service instance of \"xsec.SecurityEnvironment\"" ) ;
98*b1cdbd2cSJim Jagielski 
99*b1cdbd2cSJim Jagielski 		Reference< XSecurityEnvironment > xSecEnv( xsecenv , UNO_QUERY ) ;
100*b1cdbd2cSJim Jagielski 		OSL_ENSURE( xSecEnv.is() ,
101*b1cdbd2cSJim Jagielski 			"Signer - "
102*b1cdbd2cSJim Jagielski 			"Cannot get interface of \"XSecurityEnvironment\" from service \"xsec.SecurityEnvironment\"" ) ;
103*b1cdbd2cSJim Jagielski 
104*b1cdbd2cSJim Jagielski 		Reference< XUnoTunnel > xEnvTunnel( xsecenv , UNO_QUERY ) ;
105*b1cdbd2cSJim Jagielski 		OSL_ENSURE( xEnvTunnel.is() ,
106*b1cdbd2cSJim Jagielski 			"Signer - "
107*b1cdbd2cSJim Jagielski 			"Cannot get interface of \"XUnoTunnel\" from service \"xsec.SecurityEnvironment\"" ) ;
108*b1cdbd2cSJim Jagielski 
109*b1cdbd2cSJim Jagielski 		SecurityEnvironment_MSCryptImpl* pSecEnv = ( SecurityEnvironment_MSCryptImpl* )xEnvTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ) ;
110*b1cdbd2cSJim Jagielski 		OSL_ENSURE( pSecEnv != NULL ,
111*b1cdbd2cSJim Jagielski 			"Signer - "
112*b1cdbd2cSJim Jagielski 			"Cannot get implementation of \"xsec.SecurityEnvironment\"" ) ;
113*b1cdbd2cSJim Jagielski 
114*b1cdbd2cSJim Jagielski 		//Setup key slot and certDb
115*b1cdbd2cSJim Jagielski 		if( n_hStoreHandle != NULL ) {
116*b1cdbd2cSJim Jagielski 			pSecEnv->setCryptoSlot( n_hStoreHandle ) ;
117*b1cdbd2cSJim Jagielski 			pSecEnv->setCertDb( n_hStoreHandle ) ;
118*b1cdbd2cSJim Jagielski 		} else {
119*b1cdbd2cSJim Jagielski 			pSecEnv->enableDefaultCrypt( sal_True ) ;
120*b1cdbd2cSJim Jagielski 		}
121*b1cdbd2cSJim Jagielski 
122*b1cdbd2cSJim Jagielski 		//Get personal certificate
123*b1cdbd2cSJim Jagielski 		Sequence < Reference< XCertificate > > xPersonalCerts = pSecEnv->getPersonalCertificates() ;
124*b1cdbd2cSJim Jagielski 		OSL_ENSURE( xPersonalCerts.hasElements() ,
125*b1cdbd2cSJim Jagielski 			"getPersonalCertificates - "
126*b1cdbd2cSJim Jagielski 			"No personal certificates found\n" ) ;
127*b1cdbd2cSJim Jagielski 
128*b1cdbd2cSJim Jagielski 		Sequence < Reference< XCertificate > > xCertPath ;
129*b1cdbd2cSJim Jagielski 		for( int i = 0; i < xPersonalCerts.getLength(); i ++ ) {
130*b1cdbd2cSJim Jagielski 			//Print the certificate infomation.
131*b1cdbd2cSJim Jagielski 			fprintf( stdout, "\nPersonal Certificate Info\n" ) ;
132*b1cdbd2cSJim Jagielski 			fprintf( stdout, "\tCertificate Issuer[%s]\n", OUStringToOString( xPersonalCerts[i]->getIssuerName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
133*b1cdbd2cSJim Jagielski 			fprintf( stdout, "\tCertificate Serial Number[%s]\n", OUStringToOString( bigIntegerToNumericString( xPersonalCerts[i]->getSerialNumber() ), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
134*b1cdbd2cSJim Jagielski 			fprintf( stdout, "\tCertificate Subject[%s]\n", OUStringToOString( xPersonalCerts[i]->getSubjectName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
135*b1cdbd2cSJim Jagielski 
136*b1cdbd2cSJim Jagielski 			//build the certificate path
137*b1cdbd2cSJim Jagielski 			xCertPath = pSecEnv->buildCertificatePath( xPersonalCerts[i] ) ;
138*b1cdbd2cSJim Jagielski 			//Print the certificate path.
139*b1cdbd2cSJim Jagielski 			fprintf( stdout, "\tCertificate Path\n" ) ;
140*b1cdbd2cSJim Jagielski 			for( int j = 0; j < xCertPath.getLength(); j ++ ) {
141*b1cdbd2cSJim Jagielski 				fprintf( stdout, "\t\tCertificate Authority Subject[%s]\n", OUStringToOString( xCertPath[j]->getSubjectName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
142*b1cdbd2cSJim Jagielski 			}
143*b1cdbd2cSJim Jagielski 
144*b1cdbd2cSJim Jagielski 			//Get the certificate
145*b1cdbd2cSJim Jagielski 			Sequence < sal_Int8 > serial = xPersonalCerts[i]->getSerialNumber() ;
146*b1cdbd2cSJim Jagielski 			Reference< XCertificate > xcert = pSecEnv->getCertificate( xPersonalCerts[i]->getIssuerName(), xPersonalCerts[i]->getSerialNumber() ) ;
147*b1cdbd2cSJim Jagielski 			if( !xcert.is() ) {
148*b1cdbd2cSJim Jagielski 				fprintf( stdout, "The personal certificate is not in the certificate database\n" ) ;
149*b1cdbd2cSJim Jagielski 			}
150*b1cdbd2cSJim Jagielski 
151*b1cdbd2cSJim Jagielski 			//Get the certificate characters
152*b1cdbd2cSJim Jagielski 			sal_Int32 chars = pSecEnv->getCertificateCharacters( xPersonalCerts[i] ) ;
153*b1cdbd2cSJim Jagielski 			fprintf( stdout, "The certificate characters are %d\n", chars ) ;
154*b1cdbd2cSJim Jagielski 
155*b1cdbd2cSJim Jagielski 			//Get the certificate status
156*b1cdbd2cSJim Jagielski 			sal_Int32 validity = pSecEnv->verifyCertificate( xPersonalCerts[i] ) ;
157*b1cdbd2cSJim Jagielski 			fprintf( stdout, "The certificate validities are %d\n", validity ) ;
158*b1cdbd2cSJim Jagielski 
159*b1cdbd2cSJim Jagielski 		}
160*b1cdbd2cSJim Jagielski 	} catch( Exception& e ) {
161*b1cdbd2cSJim Jagielski 		fprintf( stderr , "Error Message: %s\n" , OUStringToOString( e.Message , RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
162*b1cdbd2cSJim Jagielski 		goto done ;
163*b1cdbd2cSJim Jagielski 	}
164*b1cdbd2cSJim Jagielski 
165*b1cdbd2cSJim Jagielski done:
166*b1cdbd2cSJim Jagielski 	if( n_hStoreHandle != NULL )
167*b1cdbd2cSJim Jagielski 		CertCloseStore( n_hStoreHandle, CERT_CLOSE_STORE_FORCE_FLAG ) ;
168*b1cdbd2cSJim Jagielski 
169*b1cdbd2cSJim Jagielski 	//xmlSecMSCryptoAppShutdown() ;
170*b1cdbd2cSJim Jagielski 
171*b1cdbd2cSJim Jagielski 	return 0;
172*b1cdbd2cSJim Jagielski }
173*b1cdbd2cSJim Jagielski 
174