|  | /************************************************************** | 
|  | * | 
|  | * Licensed to the Apache Software Foundation (ASF) under one | 
|  | * or more contributor license agreements.  See the NOTICE file | 
|  | * distributed with this work for additional information | 
|  | * regarding copyright ownership.  The ASF licenses this file | 
|  | * to you under the Apache License, Version 2.0 (the | 
|  | * "License"); you may not use this file except in compliance | 
|  | * with the License.  You may obtain a copy of the License at | 
|  | * | 
|  | *   http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, | 
|  | * software distributed under the License is distributed on an | 
|  | * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY | 
|  | * KIND, either express or implied.  See the License for the | 
|  | * specific language governing permissions and limitations | 
|  | * under the License. | 
|  | * | 
|  | *************************************************************/ | 
|  |  | 
|  |  | 
|  |  | 
|  | // MARKER(update_precomp.py): autogen include statement, do not remove | 
|  | #include "precompiled_xmlsecurity.hxx" | 
|  |  | 
|  | #include <stdio.h> | 
|  | #include "util.hxx" | 
|  |  | 
|  | #include <rtl/ustring.hxx> | 
|  | #include <cppuhelper/servicefactory.hxx> | 
|  |  | 
|  | #include <xmlsecurity/biginteger.hxx> | 
|  | #include <xmlsecurity/xmlsignaturehelper.hxx> | 
|  | #include "xmlsecurity/baseencoding.hxx" | 
|  | #include <tools/date.hxx> | 
|  | #include <tools/time.hxx> | 
|  |  | 
|  | using namespace ::com::sun::star; | 
|  |  | 
|  | long denyVerifyHandler( void *, void * ) | 
|  | { | 
|  | return  0; | 
|  | } | 
|  |  | 
|  | long startVerifyHandler( void *, void * ) | 
|  | { | 
|  | return QueryVerifySignature(); | 
|  | } | 
|  |  | 
|  | int SAL_CALL main( int argc, char **argv ) | 
|  | { | 
|  | if( argc < 5 ) | 
|  | { | 
|  | fprintf( stderr, "Usage: %s <signature file 1> <signature file 2> <xml stream file> <binary stream file> [<cryptoken>]\n" , argv[0] ) ; | 
|  | return -1 ; | 
|  | } | 
|  |  | 
|  | uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory(); | 
|  |  | 
|  | rtl::OUString aSIGFileName = rtl::OUString::createFromAscii(argv[1]); | 
|  | rtl::OUString aSIGFileName2 = rtl::OUString::createFromAscii(argv[2]); | 
|  | rtl::OUString aXMLFileName = rtl::OUString::createFromAscii(argv[3]); | 
|  | rtl::OUString aBINFileName = rtl::OUString::createFromAscii(argv[4]); | 
|  | rtl::OUString aCryptoToken; | 
|  | if ( argc >= 7 ) | 
|  | aCryptoToken = rtl::OUString::createFromAscii(argv[6]); | 
|  |  | 
|  | sal_Int32 nSecurityId; | 
|  | uno::Reference< io::XOutputStream > xOutputStream; | 
|  | uno::Reference< io::XInputStream > xInputStream; | 
|  | bool bDone; | 
|  | SignatureInformations signatureInformations; | 
|  | uno::Reference< ::com::sun::star::xml::sax::XDocumentHandler> xDocumentHandler; | 
|  |  | 
|  | // -------- START ------- | 
|  |  | 
|  | XMLSignatureHelper aSignatureHelper( xMSF ); | 
|  |  | 
|  | bool bInit = aSignatureHelper.Init( aCryptoToken ); | 
|  | if ( !bInit ) | 
|  | { | 
|  | fprintf( stderr, "Error initializing security context!\n" ); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | fprintf( stdout, "\n\nTEST MISSION 1: Create the first signature file\n"); | 
|  |  | 
|  | aSignatureHelper.StartMission(); | 
|  |  | 
|  | /* | 
|  | * select a private key certificate | 
|  | */ | 
|  | uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnvironment = aSignatureHelper.GetSecurityEnvironment(); | 
|  | uno::Sequence< uno::Reference< ::com::sun::star::security::XCertificate > > xPersonalCerts = xSecurityEnvironment->getPersonalCertificates() ; | 
|  |  | 
|  | fprintf( stdout, "\nPlease select two certificates:\n" ); | 
|  |  | 
|  | for ( int nSig = 0; nSig < 2; nSig++ ) | 
|  | { | 
|  | // New security ID for signature... | 
|  | nSecurityId = aSignatureHelper.GetNewSecurityId(); | 
|  |  | 
|  | // Select certificate... | 
|  | uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); | 
|  | aSignatureHelper.SetX509Certificate( | 
|  | nSecurityId, xPersonalCert->getIssuerName(), | 
|  | bigIntegerToNumericString( xPersonalCert->getSerialNumber()), | 
|  | baseEncode(xPersonalCert->getEncoded(), BASE64)); | 
|  | aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); | 
|  | aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); | 
|  | aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); | 
|  | } | 
|  | /* | 
|  | * creates signature | 
|  | */ | 
|  | xOutputStream = OpenOutputStream( aSIGFileName ); | 
|  | bDone = aSignatureHelper.CreateAndWriteSignature( xOutputStream ); | 
|  | if ( !bDone ) | 
|  | fprintf( stderr, "\nSTATUS MISSION 1: Error creating Signature!\n" ); | 
|  | else | 
|  | fprintf( stdout, "\nSTATUS MISSION 1: Signature successfully created!\n" ); | 
|  |  | 
|  | aSignatureHelper.EndMission(); | 
|  |  | 
|  |  | 
|  | fprintf( stdout, "\n\nTEST MISSION 2: Transfer the second signature to a new signature file\n"); | 
|  |  | 
|  | /* | 
|  | * You can use an uninitialized SignatureHelper to perform this mission. | 
|  | */ | 
|  |  | 
|  | /* | 
|  | * configures the start-verify handler. Don't need to verify for transfering... | 
|  | */ | 
|  | aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, denyVerifyHandler ) ); | 
|  | aSignatureHelper.StartMission(); | 
|  |  | 
|  | xInputStream = OpenInputStream( aSIGFileName ); | 
|  | bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); | 
|  | xInputStream->closeInput(); | 
|  |  | 
|  | if ( !bDone ) | 
|  | fprintf( stderr, "\nSTATUS MISSION 2: Error in reading Signature!\n" ); | 
|  | else | 
|  | fprintf( stdout, "\nSTATUS MISSION 2: Signature successfully transfered!\n" ); | 
|  |  | 
|  | /* | 
|  | * get all signature information | 
|  | */ | 
|  | signatureInformations = aSignatureHelper.GetSignatureInformations(); | 
|  |  | 
|  | /* | 
|  | * write the first signature into the second signature file. | 
|  | */ | 
|  |  | 
|  | xOutputStream = OpenOutputStream( aSIGFileName2 ); | 
|  | xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); | 
|  | aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); | 
|  | aSignatureHelper.CloseDocumentHandler( xDocumentHandler); | 
|  | aSignatureHelper.EndMission(); | 
|  |  | 
|  | fprintf( stdout, "\n\nTEST MISSION 3: Insert a new signature to the first signature file\n"); | 
|  |  | 
|  | aSignatureHelper.StartMission(); | 
|  |  | 
|  | nSecurityId = aSignatureHelper.GetNewSecurityId(); | 
|  |  | 
|  | // Select certificate... | 
|  | uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true ); | 
|  | aSignatureHelper.SetX509Certificate( | 
|  | nSecurityId, xPersonalCert->getIssuerName(), | 
|  | bigIntegerToNumericString( xPersonalCert->getSerialNumber()), | 
|  | baseEncode(xPersonalCert->getEncoded(), BASE64)); | 
|  | aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False ); | 
|  | aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True ); | 
|  | aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() ); | 
|  |  | 
|  |  | 
|  | xOutputStream = OpenOutputStream( aSIGFileName ); | 
|  | xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream); | 
|  |  | 
|  | aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[0]); | 
|  | bDone = aSignatureHelper.CreateAndWriteSignature( xDocumentHandler ); | 
|  | aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]); | 
|  | aSignatureHelper.CloseDocumentHandler( xDocumentHandler); | 
|  |  | 
|  | if ( !bDone ) | 
|  | fprintf( stderr, "\nSTATUS MISSION 3: Error creating Signature!\n" ); | 
|  | else | 
|  | fprintf( stdout, "\nSTATUS MISSION 3: Signature successfully created!\n" ); | 
|  |  | 
|  | aSignatureHelper.EndMission(); | 
|  |  | 
|  | fprintf( stdout, "\n\nTEST MISSION 4 : Verify the first signature file\n"); | 
|  |  | 
|  | aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, startVerifyHandler ) ); | 
|  |  | 
|  | aSignatureHelper.StartMission(); | 
|  |  | 
|  | xInputStream = OpenInputStream( aSIGFileName ); | 
|  | bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); | 
|  | xInputStream->closeInput(); | 
|  |  | 
|  | if ( !bDone ) | 
|  | fprintf( stderr, "\nSTATUS MISSION 4: Error verifying Signatures!\n" ); | 
|  | else | 
|  | fprintf( stdout, "\nSTATUS MISSION 4: All choosen Signatures veryfied successfully!\n" ); | 
|  |  | 
|  | aSignatureHelper.EndMission(); | 
|  |  | 
|  | QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); | 
|  |  | 
|  | fprintf( stdout, "\n\nTEST MISSION 5: Verify the second signature file\n"); | 
|  |  | 
|  | aSignatureHelper.StartMission(); | 
|  |  | 
|  | xInputStream = OpenInputStream( aSIGFileName2 ); | 
|  | bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream ); | 
|  | xInputStream->closeInput(); | 
|  |  | 
|  | if ( !bDone ) | 
|  | fprintf( stderr, "\nSTATUS MISSION 5: Error verifying Signatures!\n" ); | 
|  | else | 
|  | fprintf( stdout, "\nSTATUS MISSION 5: All choosen Signatures veryfied successfully!\n" ); | 
|  |  | 
|  | aSignatureHelper.EndMission(); | 
|  |  | 
|  | QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() ); | 
|  |  | 
|  | return 0; | 
|  | } |