| /************************************************************** |
| * |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| * |
| *************************************************************/ |
| |
| |
| |
| // MARKER(update_precomp.py): autogen include statement, do not remove |
| #include "precompiled_xmlsecurity.hxx" |
| #include <sal/config.h> |
| #include <rtl/uuid.h> |
| #include "securityenvironment_mscryptimpl.hxx" |
| |
| #ifndef _XMLSECURITYCONTEXT_MSCRYPTIMPL_HXX_ |
| #include "xmlsecuritycontext_mscryptimpl.hxx" |
| #endif |
| #include "xmlstreamio.hxx" |
| |
| #include "xmlsec/xmlsec.h" |
| #include "xmlsec/keysmngr.h" |
| #include "xmlsec/crypto.h" |
| #include "xmlsec/mscrypto/akmngr.h" |
| |
| using namespace ::com::sun::star::uno ; |
| using namespace ::com::sun::star::lang ; |
| using ::com::sun::star::lang::XMultiServiceFactory ; |
| using ::com::sun::star::lang::XSingleServiceFactory ; |
| using ::rtl::OUString ; |
| |
| using ::com::sun::star::xml::crypto::XSecurityEnvironment ; |
| using ::com::sun::star::xml::crypto::XXMLSecurityContext ; |
| |
| XMLSecurityContext_MSCryptImpl :: XMLSecurityContext_MSCryptImpl( const Reference< XMultiServiceFactory >& aFactory ) |
| ://m_pKeysMngr( NULL ) , |
| m_xServiceManager( aFactory ), |
| m_xSecurityEnvironment( NULL ) |
| { |
| //Init xmlsec library |
| if( xmlSecInit() < 0 ) { |
| throw RuntimeException() ; |
| } |
| |
| //Init xmlsec crypto engine library |
| if( xmlSecCryptoInit() < 0 ) { |
| xmlSecShutdown() ; |
| throw RuntimeException() ; |
| } |
| |
| //Enable external stream handlers |
| if( xmlEnableStreamInputCallbacks() < 0 ) { |
| xmlSecCryptoShutdown() ; |
| xmlSecShutdown() ; |
| throw RuntimeException() ; |
| } |
| } |
| |
| XMLSecurityContext_MSCryptImpl :: ~XMLSecurityContext_MSCryptImpl() { |
| xmlDisableStreamInputCallbacks() ; |
| xmlSecCryptoShutdown() ; |
| xmlSecShutdown() ; |
| } |
| |
| //i39448 : new methods |
| sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::addSecurityEnvironment( |
| const ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment >& aSecurityEnvironment) |
| throw (::com::sun::star::security::SecurityInfrastructureException, ::com::sun::star::uno::RuntimeException) |
| { |
| if( !aSecurityEnvironment.is() ) |
| { |
| throw RuntimeException() ; |
| } |
| |
| m_xSecurityEnvironment = aSecurityEnvironment; |
| |
| return 0; |
| } |
| |
| |
| sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::getSecurityEnvironmentNumber( ) |
| throw (::com::sun::star::uno::RuntimeException) |
| { |
| return 1; |
| } |
| |
| ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL |
| XMLSecurityContext_MSCryptImpl::getSecurityEnvironmentByIndex( sal_Int32 index ) |
| throw (::com::sun::star::uno::RuntimeException) |
| { |
| if (index == 0) |
| { |
| return m_xSecurityEnvironment; |
| } |
| else |
| throw RuntimeException() ; |
| } |
| |
| ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL |
| XMLSecurityContext_MSCryptImpl::getSecurityEnvironment( ) |
| throw (::com::sun::star::uno::RuntimeException) |
| { |
| return m_xSecurityEnvironment; |
| } |
| |
| sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::getDefaultSecurityEnvironmentIndex( ) |
| throw (::com::sun::star::uno::RuntimeException) |
| { |
| return 0; |
| } |
| |
| void SAL_CALL XMLSecurityContext_MSCryptImpl::setDefaultSecurityEnvironmentIndex( sal_Int32 /*nDefaultEnvIndex*/ ) |
| throw (::com::sun::star::uno::RuntimeException) |
| { |
| //dummy |
| } |
| |
| #if 0 |
| /* XXMLSecurityContext */ |
| void SAL_CALL XMLSecurityContext_MSCryptImpl :: setSecurityEnvironment( const Reference< XSecurityEnvironment >& aSecurityEnvironment ) throw( com::sun::star::security::SecurityInfrastructureException ) { |
| HCERTSTORE hkeyStore ; |
| HCERTSTORE hCertStore ; |
| HCRYPTKEY symKey ; |
| HCRYPTKEY pubKey ; |
| HCRYPTKEY priKey ; |
| unsigned int i ; |
| |
| if( !aSecurityEnvironment.is() ) |
| throw RuntimeException() ; |
| |
| m_xSecurityEnvironment = aSecurityEnvironment ; |
| |
| //Clear key manager |
| if( m_pKeysMngr != NULL ) { |
| xmlSecKeysMngrDestroy( m_pKeysMngr ) ; |
| m_pKeysMngr = NULL ; |
| } |
| |
| //Create key manager |
| Reference< XUnoTunnel > xEnvTunnel( m_xSecurityEnvironment , UNO_QUERY ) ; |
| if( !xEnvTunnel.is() ) { |
| throw RuntimeException() ; |
| } |
| |
| SecurityEnvironment_MSCryptImpl* pSecEnv = ( SecurityEnvironment_MSCryptImpl* )xEnvTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ) ; |
| if( pSecEnv == NULL ) |
| throw RuntimeException() ; |
| |
| hkeyStore = pSecEnv->getCryptoSlot() ; |
| hCertStore = pSecEnv->getCertDb() ; |
| |
| /*- |
| * The following lines is based on the of xmlsec-mscrypto crypto engine |
| */ |
| m_pKeysMngr = xmlSecMSCryptoAppliedKeysMngrCreate( hkeyStore , hCertStore ) ; |
| if( m_pKeysMngr == NULL ) |
| throw RuntimeException() ; |
| |
| /*- |
| * Adopt symmetric key into keys manager |
| */ |
| for( i = 0 ; ( symKey = pSecEnv->getSymKey( i ) ) != NULL ; i ++ ) { |
| if( xmlSecMSCryptoAppliedKeysMngrSymKeyLoad( m_pKeysMngr, symKey ) < 0 ) { |
| throw RuntimeException() ; |
| } |
| } |
| |
| /*- |
| * Adopt asymmetric public key into keys manager |
| */ |
| for( i = 0 ; ( pubKey = pSecEnv->getPubKey( i ) ) != NULL ; i ++ ) { |
| if( xmlSecMSCryptoAppliedKeysMngrPubKeyLoad( m_pKeysMngr, pubKey ) < 0 ) { |
| throw RuntimeException() ; |
| } |
| } |
| |
| /*- |
| * Adopt asymmetric private key into keys manager |
| */ |
| for( i = 0 ; ( priKey = pSecEnv->getPriKey( i ) ) != NULL ; i ++ ) { |
| if( xmlSecMSCryptoAppliedKeysMngrPriKeyLoad( m_pKeysMngr, priKey ) < 0 ) { |
| throw RuntimeException() ; |
| } |
| } |
| |
| /*- |
| * Adopt system default certificate store. |
| */ |
| if( pSecEnv->defaultEnabled() ) { |
| HCERTSTORE hSystemStore ; |
| |
| //Add system key store into the keys manager. |
| hSystemStore = CertOpenSystemStore( 0, "MY" ) ; |
| if( hSystemStore != NULL ) { |
| if( xmlSecMSCryptoAppliedKeysMngrAdoptKeyStore( m_pKeysMngr, hSystemStore ) < 0 ) { |
| CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ; |
| throw RuntimeException() ; |
| } |
| } |
| |
| //Add system root store into the keys manager. |
| hSystemStore = CertOpenSystemStore( 0, "Root" ) ; |
| if( hSystemStore != NULL ) { |
| if( xmlSecMSCryptoAppliedKeysMngrAdoptTrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) { |
| CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ; |
| throw RuntimeException() ; |
| } |
| } |
| |
| //Add system trusted store into the keys manager. |
| hSystemStore = CertOpenSystemStore( 0, "Trust" ) ; |
| if( hSystemStore != NULL ) { |
| if( xmlSecMSCryptoAppliedKeysMngrAdoptUntrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) { |
| CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ; |
| throw RuntimeException() ; |
| } |
| } |
| |
| //Add system CA store into the keys manager. |
| hSystemStore = CertOpenSystemStore( 0, "CA" ) ; |
| if( hSystemStore != NULL ) { |
| if( xmlSecMSCryptoAppliedKeysMngrAdoptUntrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) { |
| CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ; |
| throw RuntimeException() ; |
| } |
| } |
| } |
| } |
| |
| /* XXMLSecurityContext */ |
| Reference< XSecurityEnvironment > SAL_CALL XMLSecurityContext_MSCryptImpl :: getSecurityEnvironment() |
| throw (RuntimeException) |
| { |
| return m_xSecurityEnvironment ; |
| } |
| #endif |
| |
| /* XInitialization */ |
| void SAL_CALL XMLSecurityContext_MSCryptImpl :: initialize( const Sequence< Any >& /*aArguments*/ ) throw( Exception, RuntimeException ) { |
| // TBD |
| } ; |
| |
| /* XServiceInfo */ |
| OUString SAL_CALL XMLSecurityContext_MSCryptImpl :: getImplementationName() throw( RuntimeException ) { |
| return impl_getImplementationName() ; |
| } |
| |
| /* XServiceInfo */ |
| sal_Bool SAL_CALL XMLSecurityContext_MSCryptImpl :: supportsService( const OUString& serviceName) throw( RuntimeException ) { |
| Sequence< OUString > seqServiceNames = getSupportedServiceNames() ; |
| const OUString* pArray = seqServiceNames.getConstArray() ; |
| for( sal_Int32 i = 0 ; i < seqServiceNames.getLength() ; i ++ ) { |
| if( *( pArray + i ) == serviceName ) |
| return sal_True ; |
| } |
| return sal_False ; |
| } |
| |
| /* XServiceInfo */ |
| Sequence< OUString > SAL_CALL XMLSecurityContext_MSCryptImpl :: getSupportedServiceNames() throw( RuntimeException ) { |
| return impl_getSupportedServiceNames() ; |
| } |
| |
| //Helper for XServiceInfo |
| Sequence< OUString > XMLSecurityContext_MSCryptImpl :: impl_getSupportedServiceNames() { |
| ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ; |
| Sequence< OUString > seqServiceNames( 1 ) ; |
| seqServiceNames.getArray()[0] = OUString::createFromAscii( "com.sun.star.xml.crypto.XMLSecurityContext" ) ; |
| return seqServiceNames ; |
| } |
| |
| OUString XMLSecurityContext_MSCryptImpl :: impl_getImplementationName() throw( RuntimeException ) { |
| return OUString::createFromAscii( "com.sun.star.xml.security.bridge.xmlsec.XMLSecurityContext_MSCryptImpl" ) ; |
| } |
| |
| //Helper for registry |
| Reference< XInterface > SAL_CALL XMLSecurityContext_MSCryptImpl :: impl_createInstance( const Reference< XMultiServiceFactory >& aServiceManager ) throw( RuntimeException ) { |
| return Reference< XInterface >( *new XMLSecurityContext_MSCryptImpl( aServiceManager ) ) ; |
| } |
| |
| Reference< XSingleServiceFactory > XMLSecurityContext_MSCryptImpl :: impl_createFactory( const Reference< XMultiServiceFactory >& aServiceManager ) { |
| //Reference< XSingleServiceFactory > xFactory ; |
| //xFactory = ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName , impl_createInstance , impl_getSupportedServiceNames ) ; |
| //return xFactory ; |
| return ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName() , impl_createInstance , impl_getSupportedServiceNames() ) ; |
| } |
| |
| #if 0 |
| /* XUnoTunnel */ |
| sal_Int64 SAL_CALL XMLSecurityContext_MSCryptImpl :: getSomething( const Sequence< sal_Int8 >& aIdentifier ) |
| throw (RuntimeException) |
| { |
| if( aIdentifier.getLength() == 16 && 0 == rtl_compareMemory( getUnoTunnelId().getConstArray(), aIdentifier.getConstArray(), 16 ) ) { |
| return ( sal_Int64 )this ; |
| } |
| return 0 ; |
| } |
| |
| /* XUnoTunnel extension */ |
| const Sequence< sal_Int8>& XMLSecurityContext_MSCryptImpl :: getUnoTunnelId() { |
| static Sequence< sal_Int8 >* pSeq = 0 ; |
| if( !pSeq ) { |
| ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ; |
| if( !pSeq ) { |
| static Sequence< sal_Int8> aSeq( 16 ) ; |
| rtl_createUuid( ( sal_uInt8* )aSeq.getArray() , 0 , sal_True ) ; |
| pSeq = &aSeq ; |
| } |
| } |
| return *pSeq ; |
| } |
| |
| /* XUnoTunnel extension */ |
| XMLSecurityContext_MSCryptImpl* XMLSecurityContext_MSCryptImpl :: getImplementation( const Reference< XInterface > xObj ) { |
| Reference< XUnoTunnel > xUT( xObj , UNO_QUERY ) ; |
| if( xUT.is() ) { |
| return ( XMLSecurityContext_MSCryptImpl* )xUT->getSomething( getUnoTunnelId() ) ; |
| } else |
| return NULL ; |
| } |
| |
| /* Native methods */ |
| xmlSecKeysMngrPtr XMLSecurityContext_MSCryptImpl :: keysManager() throw( Exception, RuntimeException ) { |
| return m_pKeysMngr ; |
| } |
| #endif |
| |