1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
|
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/** -- C++ Source File -- **/
// MARKER(update_precomp.py): autogen include statement, do not remove
#include "precompiled_xmlsecurity.hxx"
#include <stdio.h>
#include "helper.hxx"
#include "libxml/tree.h"
#include "libxml/parser.h"
#ifndef XMLSEC_NO_XSLT
#include "libxslt/xslt.h"
#endif
#include "securityenvironment_mscryptimpl.hxx"
#include <xmlsecurity/biginteger.hxx>
#include "xmlsec/strings.h"
#include "xmlsec/xmltree.h"
#include "xmlsec/mscrypto/app.h"
#include <rtl/ustring.hxx>
using namespace ::rtl ;
using namespace ::cppu ;
using namespace ::com::sun::star::uno ;
using namespace ::com::sun::star::io ;
using namespace ::com::sun::star::ucb ;
using namespace ::com::sun::star::beans ;
using namespace ::com::sun::star::document ;
using namespace ::com::sun::star::lang ;
using namespace ::com::sun::star::security ;
using namespace ::com::sun::star::xml::wrapper ;
using namespace ::com::sun::star::xml::crypto ;
int SAL_CALL main( int argc, char **argv )
{
const char* n_pCertStore ;
HCERTSTORE n_hStoreHandle ;
if( argc != 3 && argc != 2 ) {
fprintf( stderr, "Usage: %s <rdb file>\n" , argv[0] ) ;
fprintf( stderr, "Or: \t%s <rdb file> < Cert Store Name >\n\n" , argv[0] ) ;
return 1 ;
}
//Initialize the crypto engine
if( argc == 3 ) {
n_pCertStore = argv[2] ;
n_hStoreHandle = CertOpenSystemStore( NULL, n_pCertStore ) ;
if( n_hStoreHandle == NULL ) {
fprintf( stderr, "Can not open the system cert store %s\n", n_pCertStore ) ;
return 1 ;
}
} else {
n_pCertStore = NULL ;
n_hStoreHandle = NULL ;
}
//xmlSecMSCryptoAppInit( n_pCertStore ) ;
try {
Reference< XMultiComponentFactory > xManager = NULL ;
Reference< XComponentContext > xContext = NULL ;
xManager = serviceManager( xContext , OUString(RTL_CONSTASCII_USTRINGPARAM("local")), OUString::createFromAscii( argv[1] ) ) ;
OSL_ENSURE( xManager.is() ,
"ServicesManager - "
"Cannot get service manager" ) ;
//Create security environment
//Build Security Environment
Reference< XInterface > xsecenv =
xManager->createInstanceWithContext( OUString(RTL_CONSTASCII_USTRINGPARAM("com.sun.star.xml.security.bridge.xmlsec.SecurityEnvironment_MSCryptImpl")), xContext ) ;
OSL_ENSURE( xsecenv.is() ,
"Signer - "
"Cannot get service instance of \"xsec.SecurityEnvironment\"" ) ;
Reference< XSecurityEnvironment > xSecEnv( xsecenv , UNO_QUERY ) ;
OSL_ENSURE( xSecEnv.is() ,
"Signer - "
"Cannot get interface of \"XSecurityEnvironment\" from service \"xsec.SecurityEnvironment\"" ) ;
Reference< XUnoTunnel > xEnvTunnel( xsecenv , UNO_QUERY ) ;
OSL_ENSURE( xEnvTunnel.is() ,
"Signer - "
"Cannot get interface of \"XUnoTunnel\" from service \"xsec.SecurityEnvironment\"" ) ;
SecurityEnvironment_MSCryptImpl* pSecEnv = ( SecurityEnvironment_MSCryptImpl* )xEnvTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ) ;
OSL_ENSURE( pSecEnv != NULL ,
"Signer - "
"Cannot get implementation of \"xsec.SecurityEnvironment\"" ) ;
//Setup key slot and certDb
if( n_hStoreHandle != NULL ) {
pSecEnv->setCryptoSlot( n_hStoreHandle ) ;
pSecEnv->setCertDb( n_hStoreHandle ) ;
} else {
pSecEnv->enableDefaultCrypt( sal_True ) ;
}
//Get personal certificate
Sequence < Reference< XCertificate > > xPersonalCerts = pSecEnv->getPersonalCertificates() ;
OSL_ENSURE( xPersonalCerts.hasElements() ,
"getPersonalCertificates - "
"No personal certificates found\n" ) ;
Sequence < Reference< XCertificate > > xCertPath ;
for( int i = 0; i < xPersonalCerts.getLength(); i ++ ) {
//Print the certificate infomation.
fprintf( stdout, "\nPersonal Certificate Info\n" ) ;
fprintf( stdout, "\tCertificate Issuer[%s]\n", OUStringToOString( xPersonalCerts[i]->getIssuerName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
fprintf( stdout, "\tCertificate Serial Number[%s]\n", OUStringToOString( bigIntegerToNumericString( xPersonalCerts[i]->getSerialNumber() ), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
fprintf( stdout, "\tCertificate Subject[%s]\n", OUStringToOString( xPersonalCerts[i]->getSubjectName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
//build the certificate path
xCertPath = pSecEnv->buildCertificatePath( xPersonalCerts[i] ) ;
//Print the certificate path.
fprintf( stdout, "\tCertificate Path\n" ) ;
for( int j = 0; j < xCertPath.getLength(); j ++ ) {
fprintf( stdout, "\t\tCertificate Authority Subject[%s]\n", OUStringToOString( xCertPath[j]->getSubjectName(), RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
}
//Get the certificate
Sequence < sal_Int8 > serial = xPersonalCerts[i]->getSerialNumber() ;
Reference< XCertificate > xcert = pSecEnv->getCertificate( xPersonalCerts[i]->getIssuerName(), xPersonalCerts[i]->getSerialNumber() ) ;
if( !xcert.is() ) {
fprintf( stdout, "The personal certificate is not in the certificate database\n" ) ;
}
//Get the certificate characters
sal_Int32 chars = pSecEnv->getCertificateCharacters( xPersonalCerts[i] ) ;
fprintf( stdout, "The certificate characters are %d\n", chars ) ;
//Get the certificate status
sal_Int32 validity = pSecEnv->verifyCertificate( xPersonalCerts[i] ) ;
fprintf( stdout, "The certificate validities are %d\n", validity ) ;
}
} catch( Exception& e ) {
fprintf( stderr , "Error Message: %s\n" , OUStringToOString( e.Message , RTL_TEXTENCODING_ASCII_US ).getStr() ) ;
goto done ;
}
done:
if( n_hStoreHandle != NULL )
CertCloseStore( n_hStoreHandle, CERT_CLOSE_STORE_FORCE_FLAG ) ;
//xmlSecMSCryptoAppShutdown() ;
return 0;
}
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|