| /************************************************************** |
| * |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| * |
| *************************************************************/ |
| |
| |
| |
| // MARKER(update_precomp.py): autogen include statement, do not remove |
| #include "precompiled_xmlsecurity.hxx" |
| |
| #include <stdio.h> |
| #include "util.hxx" |
| |
| #include <rtl/ustring.hxx> |
| #include <cppuhelper/servicefactory.hxx> |
| |
| #include <xmlsecurity/biginteger.hxx> |
| #include <xmlsecurity/xmlsignaturehelper.hxx> |
| #include "xmlsecurity/baseencoding.hxx" |
| #include <tools/date.hxx> |
| #include <tools/time.hxx> |
| |
| using namespace ::com::sun::star; |
| |
| long denyVerifyHandler( void *, void * ) |
| { |
| return 0; |
| } |
| |
| long startVerifyHandler( void *, void * ) |
| { |
| return QueryVerifySignature(); |
| } |
| |
| int SAL_CALL main( int argc, char **argv ) |
| { |
| if( argc < 5 ) |
| { |
| fprintf( stderr, "Usage: %s <signature file 1> <signature file 2> <xml stream file> <binary stream file> [<cryptoken>]\n" , argv[0] ) ; |
| return -1 ; |
| } |
| |
| uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory(); |
| |
| rtl::OUString aSIGFileName = rtl::OUString::createFromAscii(argv[1]); |
| rtl::OUString aSIGFileName2 = rtl::OUString::createFromAscii(argv[2]); |
| rtl::OUString aXMLFileName = rtl::OUString::createFromAscii(argv[3]); |
| rtl::OUString aBINFileName = rtl::OUString::createFromAscii(argv[4]); |
| rtl::OUString aCryptoToken; |
| if ( argc >= 7 ) |
| aCryptoToken = rtl::OUString::createFromAscii(argv[6]); |
| |
| sal_Int32 nSecurityId; |
| uno::Reference< io::XOutputStream > xOutputStream; |
| uno::Reference< io::XInputStream > xInputStream; |
| bool bDone; |
| SignatureInformations signatureInformations; |
| uno::Reference< ::com::sun::star::xml::sax::XDocumentHandler> xDocumentHandler; |
| |
| // -------- START ------- |
| |
| XMLSignatureHelper aSignatureHelper( xMSF ); |
| |
| bool bInit = aSignatureHelper.Init( aCryptoToken ); |
| if ( !bInit ) |
| { |
| fprintf( stderr, "Error initializing security context!\n" ); |
| return -1; |
| } |
| |
| fprintf( stdout, "\n\nTEST MISSION 1: Create the first signature file\n"); |
| |
| aSignatureHelper.StartMission(); |
| |
| /* |
| * select a private key certificate |
| */ |
| uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnvironment = aSignatureHelper.GetSecurityEnvironment(); |
| uno::Sequence< uno::Reference< ::com::sun::star::security::XCertificate > > xPersonalCerts = xSecurityEnvironment->getPersonalCertificates() ; |
| |
| fprintf( stdout, "\nPlease select two certificates:\n" ); |
| |
| for ( int nSig = 0; nSig < 2; nSig++ ) |
| { |
| // New security ID for signature... |
| nSecurityId = aSignatureHelper.GetNewSecurityId(); |
| |
| // Select certificate... |
| uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); |
| aSignatureHelper.SetX509Certificate( |
| nSecurityId, xPersonalCert->getIssuerName(), |
| bigIntegerToNumericString( xPersonalCert->getSerialNumber()), |
| baseEncode(xPersonalCert->getEncoded(), BASE64)); |
| aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); |
| aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); |
| aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); |
| } |
| /* |
| * creates signature |
| */ |
| xOutputStream = OpenOutputStream( aSIGFileName ); |
| bDone = aSignatureHelper.CreateAndWriteSignature( xOutputStream ); |
| if ( !bDone ) |
| fprintf( stderr, "\nSTATUS MISSION 1: Error creating Signature!\n" ); |
| else |
| fprintf( stdout, "\nSTATUS MISSION 1: Signature successfully created!\n" ); |
| |
| aSignatureHelper.EndMission(); |
| |
| |
| fprintf( stdout, "\n\nTEST MISSION 2: Transfer the second signature to a new signature file\n"); |
| |
| /* |
| * You can use an uninitialized SignatureHelper to perform this mission. |
| */ |
| |
| /* |
| * configures the start-verify handler. Don't need to verify for transfering... |
| */ |
| aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, denyVerifyHandler ) ); |
| aSignatureHelper.StartMission(); |
| |
| xInputStream = OpenInputStream( aSIGFileName ); |
| bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); |
| xInputStream->closeInput(); |
| |
| if ( !bDone ) |
| fprintf( stderr, "\nSTATUS MISSION 2: Error in reading Signature!\n" ); |
| else |
| fprintf( stdout, "\nSTATUS MISSION 2: Signature successfully transfered!\n" ); |
| |
| /* |
| * get all signature information |
| */ |
| signatureInformations = aSignatureHelper.GetSignatureInformations(); |
| |
| /* |
| * write the first signature into the second signature file. |
| */ |
| |
| xOutputStream = OpenOutputStream( aSIGFileName2 ); |
| xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); |
| aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); |
| aSignatureHelper.CloseDocumentHandler( xDocumentHandler); |
| aSignatureHelper.EndMission(); |
| |
| fprintf( stdout, "\n\nTEST MISSION 3: Insert a new signature to the first signature file\n"); |
| |
| aSignatureHelper.StartMission(); |
| |
| nSecurityId = aSignatureHelper.GetNewSecurityId(); |
| |
| // Select certificate... |
| uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); |
| aSignatureHelper.SetX509Certificate( |
| nSecurityId, xPersonalCert->getIssuerName(), |
| bigIntegerToNumericString( xPersonalCert->getSerialNumber()), |
| baseEncode(xPersonalCert->getEncoded(), BASE64)); |
| aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); |
| aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); |
| aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); |
| |
| |
| xOutputStream = OpenOutputStream( aSIGFileName ); |
| xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); |
| |
| aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[0]); |
| bDone = aSignatureHelper.CreateAndWriteSignature( xDocumentHandler ); |
| aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); |
| aSignatureHelper.CloseDocumentHandler( xDocumentHandler); |
| |
| if ( !bDone ) |
| fprintf( stderr, "\nSTATUS MISSION 3: Error creating Signature!\n" ); |
| else |
| fprintf( stdout, "\nSTATUS MISSION 3: Signature successfully created!\n" ); |
| |
| aSignatureHelper.EndMission(); |
| |
| fprintf( stdout, "\n\nTEST MISSION 4 : Verify the first signature file\n"); |
| |
| aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, startVerifyHandler ) ); |
| |
| aSignatureHelper.StartMission(); |
| |
| xInputStream = OpenInputStream( aSIGFileName ); |
| bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); |
| xInputStream->closeInput(); |
| |
| if ( !bDone ) |
| fprintf( stderr, "\nSTATUS MISSION 4: Error verifying Signatures!\n" ); |
| else |
| fprintf( stdout, "\nSTATUS MISSION 4: All choosen Signatures veryfied successfully!\n" ); |
| |
| aSignatureHelper.EndMission(); |
| |
| QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); |
| |
| fprintf( stdout, "\n\nTEST MISSION 5: Verify the second signature file\n"); |
| |
| aSignatureHelper.StartMission(); |
| |
| xInputStream = OpenInputStream( aSIGFileName2 ); |
| bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); |
| xInputStream->closeInput(); |
| |
| if ( !bDone ) |
| fprintf( stderr, "\nSTATUS MISSION 5: Error verifying Signatures!\n" ); |
| else |
| fprintf( stdout, "\nSTATUS MISSION 5: All choosen Signatures veryfied successfully!\n" ); |
| |
| aSignatureHelper.EndMission(); |
| |
| QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); |
| |
| return 0; |
| } |