xref: /AOO41X/main/xmlsecurity/source/xmlsec/mscrypt/xmlsecuritycontext_mscryptimpl.cxx (revision 06b3ce531745799678cf4bb887ef37436d81238b)
1 /**************************************************************
2  *
3  * Licensed to the Apache Software Foundation (ASF) under one
4  * or more contributor license agreements.  See the NOTICE file
5  * distributed with this work for additional information
6  * regarding copyright ownership.  The ASF licenses this file
7  * to you under the Apache License, Version 2.0 (the
8  * "License"); you may not use this file except in compliance
9  * with the License.  You may obtain a copy of the License at
10  *
11  *   http://www.apache.org/licenses/LICENSE-2.0
12  *
13  * Unless required by applicable law or agreed to in writing,
14  * software distributed under the License is distributed on an
15  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16  * KIND, either express or implied.  See the License for the
17  * specific language governing permissions and limitations
18  * under the License.
19  *
20  *************************************************************/
21 
22 
23 
24 // MARKER(update_precomp.py): autogen include statement, do not remove
25 #include "precompiled_xmlsecurity.hxx"
26 #include <sal/config.h>
27 #include <rtl/uuid.h>
28 #include "securityenvironment_mscryptimpl.hxx"
29 
30 #ifndef _XMLSECURITYCONTEXT_MSCRYPTIMPL_HXX_
31 #include "xmlsecuritycontext_mscryptimpl.hxx"
32 #endif
33 #include "xmlstreamio.hxx"
34 
35 #include "xmlsec/xmlsec.h"
36 #include "xmlsec/keysmngr.h"
37 #include "xmlsec/crypto.h"
38 #include "xmlsec/mscrypto/akmngr.h"
39 
40 using namespace ::com::sun::star::uno ;
41 using namespace ::com::sun::star::lang ;
42 using ::com::sun::star::lang::XMultiServiceFactory ;
43 using ::com::sun::star::lang::XSingleServiceFactory ;
44 using ::rtl::OUString ;
45 
46 using ::com::sun::star::xml::crypto::XSecurityEnvironment ;
47 using ::com::sun::star::xml::crypto::XXMLSecurityContext ;
48 
XMLSecurityContext_MSCryptImpl(const Reference<XMultiServiceFactory> & aFactory)49 XMLSecurityContext_MSCryptImpl :: XMLSecurityContext_MSCryptImpl( const Reference< XMultiServiceFactory >& aFactory )
50     ://m_pKeysMngr( NULL ) ,
51      m_xServiceManager( aFactory ),
52      m_xSecurityEnvironment( NULL )
53 {
54     //Init xmlsec library
55     if( xmlSecInit() < 0 ) {
56         throw RuntimeException() ;
57     }
58 
59     //Init xmlsec crypto engine library
60     if( xmlSecCryptoInit() < 0 ) {
61         xmlSecShutdown() ;
62         throw RuntimeException() ;
63     }
64 
65     //Enable external stream handlers
66     if( xmlEnableStreamInputCallbacks() < 0 ) {
67         xmlSecCryptoShutdown() ;
68         xmlSecShutdown() ;
69         throw RuntimeException() ;
70     }
71 }
72 
~XMLSecurityContext_MSCryptImpl()73 XMLSecurityContext_MSCryptImpl :: ~XMLSecurityContext_MSCryptImpl() {
74     xmlDisableStreamInputCallbacks() ;
75     xmlSecCryptoShutdown() ;
76     xmlSecShutdown() ;
77 }
78 
79 //i39448 : new methods
addSecurityEnvironment(const::com::sun::star::uno::Reference<::com::sun::star::xml::crypto::XSecurityEnvironment> & aSecurityEnvironment)80 sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::addSecurityEnvironment(
81     const ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment >& aSecurityEnvironment)
82     throw (::com::sun::star::security::SecurityInfrastructureException, ::com::sun::star::uno::RuntimeException)
83 {
84     if( !aSecurityEnvironment.is() )
85     {
86         throw RuntimeException() ;
87     }
88 
89     m_xSecurityEnvironment = aSecurityEnvironment;
90 
91     return 0;
92 }
93 
94 
getSecurityEnvironmentNumber()95 sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::getSecurityEnvironmentNumber(  )
96     throw (::com::sun::star::uno::RuntimeException)
97 {
98     return 1;
99 }
100 
101 ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL
getSecurityEnvironmentByIndex(sal_Int32 index)102     XMLSecurityContext_MSCryptImpl::getSecurityEnvironmentByIndex( sal_Int32 index )
103     throw (::com::sun::star::uno::RuntimeException)
104 {
105     if (index == 0)
106     {
107         return m_xSecurityEnvironment;
108     }
109     else
110         throw RuntimeException() ;
111 }
112 
113 ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL
getSecurityEnvironment()114     XMLSecurityContext_MSCryptImpl::getSecurityEnvironment(  )
115     throw (::com::sun::star::uno::RuntimeException)
116 {
117     return m_xSecurityEnvironment;
118 }
119 
getDefaultSecurityEnvironmentIndex()120 sal_Int32 SAL_CALL XMLSecurityContext_MSCryptImpl::getDefaultSecurityEnvironmentIndex(  )
121     throw (::com::sun::star::uno::RuntimeException)
122 {
123     return 0;
124 }
125 
setDefaultSecurityEnvironmentIndex(sal_Int32)126 void SAL_CALL XMLSecurityContext_MSCryptImpl::setDefaultSecurityEnvironmentIndex( sal_Int32 /*nDefaultEnvIndex*/ )
127     throw (::com::sun::star::uno::RuntimeException)
128 {
129     //dummy
130 }
131 
132 #if 0
133 /* XXMLSecurityContext */
134 void SAL_CALL XMLSecurityContext_MSCryptImpl :: setSecurityEnvironment( const Reference< XSecurityEnvironment >& aSecurityEnvironment ) throw( com::sun::star::security::SecurityInfrastructureException ) {
135     HCERTSTORE hkeyStore ;
136     HCERTSTORE hCertStore ;
137     HCRYPTKEY symKey ;
138     HCRYPTKEY pubKey ;
139     HCRYPTKEY priKey ;
140     unsigned int i ;
141 
142     if( !aSecurityEnvironment.is() )
143         throw RuntimeException() ;
144 
145     m_xSecurityEnvironment = aSecurityEnvironment ;
146 
147     //Clear key manager
148     if( m_pKeysMngr != NULL ) {
149         xmlSecKeysMngrDestroy( m_pKeysMngr ) ;
150         m_pKeysMngr = NULL ;
151     }
152 
153     //Create key manager
154     Reference< XUnoTunnel > xEnvTunnel( m_xSecurityEnvironment , UNO_QUERY ) ;
155     if( !xEnvTunnel.is() ) {
156         throw RuntimeException() ;
157     }
158 
159     SecurityEnvironment_MSCryptImpl* pSecEnv = ( SecurityEnvironment_MSCryptImpl* )xEnvTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ) ;
160     if( pSecEnv == NULL )
161         throw RuntimeException() ;
162 
163     hkeyStore = pSecEnv->getCryptoSlot() ;
164     hCertStore = pSecEnv->getCertDb() ;
165 
166     /*-
167      * The following lines is based on the of xmlsec-mscrypto crypto engine
168      */
169     m_pKeysMngr = xmlSecMSCryptoAppliedKeysMngrCreate( hkeyStore , hCertStore ) ;
170     if( m_pKeysMngr == NULL )
171         throw RuntimeException() ;
172 
173     /*-
174      * Adopt symmetric key into keys manager
175      */
176     for( i = 0 ; ( symKey = pSecEnv->getSymKey( i ) ) != NULL ; i ++ ) {
177         if( xmlSecMSCryptoAppliedKeysMngrSymKeyLoad( m_pKeysMngr, symKey ) < 0 ) {
178             throw RuntimeException() ;
179         }
180     }
181 
182     /*-
183      * Adopt asymmetric public key into keys manager
184      */
185     for( i = 0 ; ( pubKey = pSecEnv->getPubKey( i ) ) != NULL ; i ++ ) {
186         if( xmlSecMSCryptoAppliedKeysMngrPubKeyLoad( m_pKeysMngr, pubKey ) < 0 ) {
187             throw RuntimeException() ;
188         }
189     }
190 
191     /*-
192      * Adopt asymmetric private key into keys manager
193      */
194     for( i = 0 ; ( priKey = pSecEnv->getPriKey( i ) ) != NULL ; i ++ ) {
195         if( xmlSecMSCryptoAppliedKeysMngrPriKeyLoad( m_pKeysMngr, priKey ) < 0 ) {
196             throw RuntimeException() ;
197         }
198     }
199 
200     /*-
201      * Adopt system default certificate store.
202      */
203     if( pSecEnv->defaultEnabled() ) {
204         HCERTSTORE hSystemStore ;
205 
206         //Add system key store into the keys manager.
207         hSystemStore = CertOpenSystemStore( 0, "MY" ) ;
208         if( hSystemStore != NULL ) {
209             if( xmlSecMSCryptoAppliedKeysMngrAdoptKeyStore( m_pKeysMngr, hSystemStore ) < 0 ) {
210                 CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ;
211                 throw RuntimeException() ;
212             }
213         }
214 
215         //Add system root store into the keys manager.
216         hSystemStore = CertOpenSystemStore( 0, "Root" ) ;
217         if( hSystemStore != NULL ) {
218             if( xmlSecMSCryptoAppliedKeysMngrAdoptTrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) {
219                 CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ;
220                 throw RuntimeException() ;
221             }
222         }
223 
224         //Add system trusted store into the keys manager.
225         hSystemStore = CertOpenSystemStore( 0, "Trust" ) ;
226         if( hSystemStore != NULL ) {
227             if( xmlSecMSCryptoAppliedKeysMngrAdoptUntrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) {
228                 CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ;
229                 throw RuntimeException() ;
230             }
231         }
232 
233         //Add system CA store into the keys manager.
234         hSystemStore = CertOpenSystemStore( 0, "CA" ) ;
235         if( hSystemStore != NULL ) {
236             if( xmlSecMSCryptoAppliedKeysMngrAdoptUntrustedStore( m_pKeysMngr, hSystemStore ) < 0 ) {
237                 CertCloseStore( hSystemStore, CERT_CLOSE_STORE_CHECK_FLAG ) ;
238                 throw RuntimeException() ;
239             }
240         }
241     }
242 }
243 
244 /* XXMLSecurityContext */
245 Reference< XSecurityEnvironment > SAL_CALL XMLSecurityContext_MSCryptImpl :: getSecurityEnvironment()
246     throw (RuntimeException)
247 {
248     return  m_xSecurityEnvironment ;
249 }
250 #endif
251 
252 /* XInitialization */
initialize(const Sequence<Any> &)253 void SAL_CALL XMLSecurityContext_MSCryptImpl :: initialize( const Sequence< Any >& /*aArguments*/ ) throw( Exception, RuntimeException ) {
254     // TBD
255 } ;
256 
257 /* XServiceInfo */
getImplementationName()258 OUString SAL_CALL XMLSecurityContext_MSCryptImpl :: getImplementationName() throw( RuntimeException ) {
259     return impl_getImplementationName() ;
260 }
261 
262 /* XServiceInfo */
supportsService(const OUString & serviceName)263 sal_Bool SAL_CALL XMLSecurityContext_MSCryptImpl :: supportsService( const OUString& serviceName) throw( RuntimeException ) {
264     Sequence< OUString > seqServiceNames = getSupportedServiceNames() ;
265     const OUString* pArray = seqServiceNames.getConstArray() ;
266     for( sal_Int32 i = 0 ; i < seqServiceNames.getLength() ; i ++ ) {
267         if( *( pArray + i ) == serviceName )
268             return sal_True ;
269     }
270     return sal_False ;
271 }
272 
273 /* XServiceInfo */
getSupportedServiceNames()274 Sequence< OUString > SAL_CALL XMLSecurityContext_MSCryptImpl :: getSupportedServiceNames() throw( RuntimeException ) {
275     return impl_getSupportedServiceNames() ;
276 }
277 
278 //Helper for XServiceInfo
impl_getSupportedServiceNames()279 Sequence< OUString > XMLSecurityContext_MSCryptImpl :: impl_getSupportedServiceNames() {
280     ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
281     Sequence< OUString > seqServiceNames( 1 ) ;
282     seqServiceNames.getArray()[0] = OUString::createFromAscii( "com.sun.star.xml.crypto.XMLSecurityContext" ) ;
283     return seqServiceNames ;
284 }
285 
impl_getImplementationName()286 OUString XMLSecurityContext_MSCryptImpl :: impl_getImplementationName() throw( RuntimeException ) {
287     return OUString::createFromAscii( "com.sun.star.xml.security.bridge.xmlsec.XMLSecurityContext_MSCryptImpl" ) ;
288 }
289 
290 //Helper for registry
impl_createInstance(const Reference<XMultiServiceFactory> & aServiceManager)291 Reference< XInterface > SAL_CALL XMLSecurityContext_MSCryptImpl :: impl_createInstance( const Reference< XMultiServiceFactory >& aServiceManager ) throw( RuntimeException ) {
292     return Reference< XInterface >( *new XMLSecurityContext_MSCryptImpl( aServiceManager ) ) ;
293 }
294 
impl_createFactory(const Reference<XMultiServiceFactory> & aServiceManager)295 Reference< XSingleServiceFactory > XMLSecurityContext_MSCryptImpl :: impl_createFactory( const Reference< XMultiServiceFactory >& aServiceManager ) {
296     //Reference< XSingleServiceFactory > xFactory ;
297     //xFactory = ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName , impl_createInstance , impl_getSupportedServiceNames ) ;
298     //return xFactory ;
299     return ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName() , impl_createInstance , impl_getSupportedServiceNames() ) ;
300 }
301 
302 #if 0
303 /* XUnoTunnel */
304 sal_Int64 SAL_CALL XMLSecurityContext_MSCryptImpl :: getSomething( const Sequence< sal_Int8 >& aIdentifier )
305 throw (RuntimeException)
306 {
307     if( aIdentifier.getLength() == 16 && 0 == rtl_compareMemory( getUnoTunnelId().getConstArray(), aIdentifier.getConstArray(), 16 ) ) {
308         return ( sal_Int64 )this ;
309     }
310     return 0 ;
311 }
312 
313 /* XUnoTunnel extension */
314 const Sequence< sal_Int8>& XMLSecurityContext_MSCryptImpl :: getUnoTunnelId() {
315     static Sequence< sal_Int8 >* pSeq = 0 ;
316     if( !pSeq ) {
317         ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
318         if( !pSeq ) {
319             static Sequence< sal_Int8> aSeq( 16 ) ;
320             rtl_createUuid( ( sal_uInt8* )aSeq.getArray() , 0 , sal_True ) ;
321             pSeq = &aSeq ;
322         }
323     }
324     return *pSeq ;
325 }
326 
327 /* XUnoTunnel extension */
328 XMLSecurityContext_MSCryptImpl* XMLSecurityContext_MSCryptImpl :: getImplementation( const Reference< XInterface > xObj ) {
329     Reference< XUnoTunnel > xUT( xObj , UNO_QUERY ) ;
330     if( xUT.is() ) {
331         return ( XMLSecurityContext_MSCryptImpl* )xUT->getSomething( getUnoTunnelId() ) ;
332     } else
333         return NULL ;
334 }
335 
336 /* Native methods */
337 xmlSecKeysMngrPtr XMLSecurityContext_MSCryptImpl :: keysManager() throw( Exception, RuntimeException ) {
338     return m_pKeysMngr ;
339 }
340 #endif
341 
342