blob: c16d672e79480d1a93c4399fa9a169233170d6c5 [file] [log] [blame]
/**************************************************************
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*************************************************************/
// MARKER(update_precomp.py): autogen include statement, do not remove
#include "precompiled_xmlsecurity.hxx"
#include <stdio.h>
#include "util.hxx"
#include <rtl/ustring.hxx>
#include <cppuhelper/servicefactory.hxx>
#include <xmlsecurity/biginteger.hxx>
#include <xmlsecurity/xmlsignaturehelper.hxx>
#include "xmlsecurity/baseencoding.hxx"
#include <tools/date.hxx>
#include <tools/time.hxx>
using namespace ::com::sun::star;
long denyVerifyHandler( void *, void * )
{
return 0;
}
long startVerifyHandler( void *, void * )
{
return QueryVerifySignature();
}
int SAL_CALL main( int argc, char **argv )
{
if( argc < 5 )
{
fprintf( stderr, "Usage: %s <signature file 1> <signature file 2> <xml stream file> <binary stream file> [<cryptoken>]\n" , argv[0] ) ;
return -1 ;
}
uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory();
rtl::OUString aSIGFileName = rtl::OUString::createFromAscii(argv[1]);
rtl::OUString aSIGFileName2 = rtl::OUString::createFromAscii(argv[2]);
rtl::OUString aXMLFileName = rtl::OUString::createFromAscii(argv[3]);
rtl::OUString aBINFileName = rtl::OUString::createFromAscii(argv[4]);
rtl::OUString aCryptoToken;
if ( argc >= 7 )
aCryptoToken = rtl::OUString::createFromAscii(argv[6]);
sal_Int32 nSecurityId;
uno::Reference< io::XOutputStream > xOutputStream;
uno::Reference< io::XInputStream > xInputStream;
bool bDone;
SignatureInformations signatureInformations;
uno::Reference< ::com::sun::star::xml::sax::XDocumentHandler> xDocumentHandler;
// -------- START -------
XMLSignatureHelper aSignatureHelper( xMSF );
bool bInit = aSignatureHelper.Init( aCryptoToken );
if ( !bInit )
{
fprintf( stderr, "Error initializing security context!\n" );
return -1;
}
fprintf( stdout, "\n\nTEST MISSION 1: Create the first signature file\n");
aSignatureHelper.StartMission();
/*
* select a private key certificate
*/
uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnvironment = aSignatureHelper.GetSecurityEnvironment();
uno::Sequence< uno::Reference< ::com::sun::star::security::XCertificate > > xPersonalCerts = xSecurityEnvironment->getPersonalCertificates() ;
fprintf( stdout, "\nPlease select two certificates:\n" );
for ( int nSig = 0; nSig < 2; nSig++ )
{
// New security ID for signature...
nSecurityId = aSignatureHelper.GetNewSecurityId();
// Select certificate...
uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true );
aSignatureHelper.SetX509Certificate(
nSecurityId, xPersonalCert->getIssuerName(),
bigIntegerToNumericString( xPersonalCert->getSerialNumber()),
baseEncode(xPersonalCert->getEncoded(), BASE64));
aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False );
aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True );
aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() );
}
/*
* creates signature
*/
xOutputStream = OpenOutputStream( aSIGFileName );
bDone = aSignatureHelper.CreateAndWriteSignature( xOutputStream );
if ( !bDone )
fprintf( stderr, "\nSTATUS MISSION 1: Error creating Signature!\n" );
else
fprintf( stdout, "\nSTATUS MISSION 1: Signature successfully created!\n" );
aSignatureHelper.EndMission();
fprintf( stdout, "\n\nTEST MISSION 2: Transfer the second signature to a new signature file\n");
/*
* You can use an uninitialized SignatureHelper to perform this mission.
*/
/*
* configures the start-verify handler. Don't need to verify for transfering...
*/
aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, denyVerifyHandler ) );
aSignatureHelper.StartMission();
xInputStream = OpenInputStream( aSIGFileName );
bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
xInputStream->closeInput();
if ( !bDone )
fprintf( stderr, "\nSTATUS MISSION 2: Error in reading Signature!\n" );
else
fprintf( stdout, "\nSTATUS MISSION 2: Signature successfully transfered!\n" );
/*
* get all signature information
*/
signatureInformations = aSignatureHelper.GetSignatureInformations();
/*
* write the first signature into the second signature file.
*/
xOutputStream = OpenOutputStream( aSIGFileName2 );
xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream);
aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]);
aSignatureHelper.CloseDocumentHandler( xDocumentHandler);
aSignatureHelper.EndMission();
fprintf( stdout, "\n\nTEST MISSION 3: Insert a new signature to the first signature file\n");
aSignatureHelper.StartMission();
nSecurityId = aSignatureHelper.GetNewSecurityId();
// Select certificate...
uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true );
aSignatureHelper.SetX509Certificate(
nSecurityId, xPersonalCert->getIssuerName(),
bigIntegerToNumericString( xPersonalCert->getSerialNumber()),
baseEncode(xPersonalCert->getEncoded(), BASE64));
aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False );
aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True );
aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() );
xOutputStream = OpenOutputStream( aSIGFileName );
xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream);
aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[0]);
bDone = aSignatureHelper.CreateAndWriteSignature( xDocumentHandler );
aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]);
aSignatureHelper.CloseDocumentHandler( xDocumentHandler);
if ( !bDone )
fprintf( stderr, "\nSTATUS MISSION 3: Error creating Signature!\n" );
else
fprintf( stdout, "\nSTATUS MISSION 3: Signature successfully created!\n" );
aSignatureHelper.EndMission();
fprintf( stdout, "\n\nTEST MISSION 4 : Verify the first signature file\n");
aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, startVerifyHandler ) );
aSignatureHelper.StartMission();
xInputStream = OpenInputStream( aSIGFileName );
bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
xInputStream->closeInput();
if ( !bDone )
fprintf( stderr, "\nSTATUS MISSION 4: Error verifying Signatures!\n" );
else
fprintf( stdout, "\nSTATUS MISSION 4: All choosen Signatures veryfied successfully!\n" );
aSignatureHelper.EndMission();
QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() );
fprintf( stdout, "\n\nTEST MISSION 5: Verify the second signature file\n");
aSignatureHelper.StartMission();
xInputStream = OpenInputStream( aSIGFileName2 );
bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
xInputStream->closeInput();
if ( !bDone )
fprintf( stderr, "\nSTATUS MISSION 5: Error verifying Signatures!\n" );
else
fprintf( stdout, "\nSTATUS MISSION 5: All choosen Signatures veryfied successfully!\n" );
aSignatureHelper.EndMission();
QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() );
return 0;
}