xref: /AOO41X/main/xmlsecurity/source/xmlsec/nss/securityenvironment_nssimpl.cxx (revision 06b3ce531745799678cf4bb887ef37436d81238b)
1 /**************************************************************
2  *
3  * Licensed to the Apache Software Foundation (ASF) under one
4  * or more contributor license agreements.  See the NOTICE file
5  * distributed with this work for additional information
6  * regarding copyright ownership.  The ASF licenses this file
7  * to you under the Apache License, Version 2.0 (the
8  * "License"); you may not use this file except in compliance
9  * with the License.  You may obtain a copy of the License at
10  *
11  *   http://www.apache.org/licenses/LICENSE-2.0
12  *
13  * Unless required by applicable law or agreed to in writing,
14  * software distributed under the License is distributed on an
15  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16  * KIND, either express or implied.  See the License for the
17  * specific language governing permissions and limitations
18  * under the License.
19  *
20  *************************************************************/
21 
22 
23 
24 
25 // MARKER(update_precomp.py): autogen include statement, do not remove
26 #include "precompiled_xmlsecurity.hxx"
27 
28 //todo before commit:  nssrenam.h is not delivered!!!
29 #ifndef __nssrenam_h_
30 #define CERT_NewTempCertificate __CERT_NewTempCertificate
31 #endif /* __nssrenam_h_ */
32 
33 #include "cert.h"
34 #include "secerr.h"
35 #include "ocsp.h"
36 
37 #include <sal/config.h>
38 #include "securityenvironment_nssimpl.hxx"
39 #include "x509certificate_nssimpl.hxx"
40 #include <rtl/uuid.h>
41 #include "../diagnose.hxx"
42 
43 #include <sal/types.h>
44 //For reasons that escape me, this is what xmlsec does when size_t is not 4
45 #if SAL_TYPES_SIZEOFPOINTER != 4
46 #    define XMLSEC_NO_SIZE_T
47 #endif
48 #include <xmlsec/xmlsec.h>
49 #include <xmlsec/keysmngr.h>
50 #include <xmlsec/crypto.h>
51 #include <xmlsec/base64.h>
52 #include <xmlsec/strings.h>
53 
54 #include <tools/string.hxx>
55 #include <rtl/ustrbuf.hxx>
56 #include <comphelper/processfactory.hxx>
57 #include <cppuhelper/servicefactory.hxx>
58 #include <comphelper/docpasswordrequest.hxx>
59 #include <xmlsecurity/biginteger.hxx>
60 #include <rtl/logfile.h>
61 #include <com/sun/star/task/XInteractionHandler.hpp>
62 #include <vector>
63 #include "boost/scoped_array.hpp"
64 
65 #include "secerror.hxx"
66 
67 // MM : added for password exception
68 #include <com/sun/star/security/NoPasswordException.hpp>
69 namespace csss = ::com::sun::star::security;
70 using namespace xmlsecurity;
71 using namespace ::com::sun::star::security;
72 using namespace com::sun::star;
73 using namespace ::com::sun::star::uno ;
74 using namespace ::com::sun::star::lang ;
75 using ::com::sun::star::lang::XMultiServiceFactory ;
76 using ::com::sun::star::lang::XSingleServiceFactory ;
77 using ::rtl::OUString ;
78 
79 using ::com::sun::star::xml::crypto::XSecurityEnvironment ;
80 using ::com::sun::star::security::XCertificate ;
81 
82 extern X509Certificate_NssImpl* NssCertToXCert( CERTCertificate* cert ) ;
83 extern X509Certificate_NssImpl* NssPrivKeyToXCert( SECKEYPrivateKey* ) ;
84 
85 
86 struct UsageDescription
87 {
88     SECCertificateUsage usage;
89     char const* description;
90 
UsageDescriptionUsageDescription91     UsageDescription()
92     : usage( certificateUsageCheckAllUsages )
93     , description( NULL )
94     {}
95 
UsageDescriptionUsageDescription96     UsageDescription( SECCertificateUsage i_usage, char const* i_description )
97     : usage( i_usage )
98     , description( i_description )
99     {}
100 
UsageDescriptionUsageDescription101     UsageDescription( const UsageDescription& aDescription )
102     : usage( aDescription.usage )
103     , description( aDescription.description )
104     {}
105 
operator =UsageDescription106     UsageDescription& operator =( const UsageDescription& aDescription )
107     {
108         usage = aDescription.usage;
109         description = aDescription.description;
110         return *this;
111     }
112 };
113 
114 
115 
GetPasswordFunction(PK11SlotInfo * pSlot,PRBool bRetry,void *)116 char* GetPasswordFunction( PK11SlotInfo* pSlot, PRBool bRetry, void* /*arg*/ )
117 {
118     uno::Reference< lang::XMultiServiceFactory > xMSF( ::comphelper::getProcessServiceFactory() );
119     if ( xMSF.is() )
120     {
121         uno::Reference < task::XInteractionHandler > xInteractionHandler(
122             xMSF->createInstance( rtl::OUString::createFromAscii("com.sun.star.task.InteractionHandler") ), uno::UNO_QUERY );
123 
124         if ( xInteractionHandler.is() )
125         {
126             task::PasswordRequestMode eMode = bRetry ? task::PasswordRequestMode_PASSWORD_REENTER : task::PasswordRequestMode_PASSWORD_ENTER;
127             ::comphelper::DocPasswordRequest* pPasswordRequest = new ::comphelper::DocPasswordRequest(
128                 ::comphelper::DocPasswordRequestType_STANDARD, eMode, ::rtl::OUString::createFromAscii(PK11_GetTokenName(pSlot)) );
129 
130             uno::Reference< task::XInteractionRequest > xRequest( pPasswordRequest );
131             xInteractionHandler->handle( xRequest );
132 
133             if ( pPasswordRequest->isPassword() )
134             {
135                 ByteString aPassword = ByteString( String( pPasswordRequest->getPassword() ), gsl_getSystemTextEncoding() );
136                 sal_uInt16 nLen = aPassword.Len();
137                 char* pPassword = (char*) PORT_Alloc( nLen+1 ) ;
138                 pPassword[nLen] = 0;
139                 memcpy( pPassword, aPassword.GetBuffer(), nLen );
140                 return pPassword;
141             }
142         }
143     }
144     return NULL;
145 }
146 
SecurityEnvironment_NssImpl(const Reference<XMultiServiceFactory> &)147 SecurityEnvironment_NssImpl :: SecurityEnvironment_NssImpl( const Reference< XMultiServiceFactory >& ) :
148 m_pHandler( NULL ) , m_tSymKeyList() , m_tPubKeyList() , m_tPriKeyList() {
149 
150     PK11_SetPasswordFunc( GetPasswordFunction ) ;
151 }
152 
~SecurityEnvironment_NssImpl()153 SecurityEnvironment_NssImpl :: ~SecurityEnvironment_NssImpl() {
154 
155     PK11_SetPasswordFunc( NULL ) ;
156 
157     for (CIT_SLOTS i = m_Slots.begin(); i != m_Slots.end(); i++)
158     {
159         PK11_FreeSlot(*i);
160     }
161 
162     if( !m_tSymKeyList.empty()  ) {
163         std::list< PK11SymKey* >::iterator symKeyIt ;
164 
165         for( symKeyIt = m_tSymKeyList.begin() ; symKeyIt != m_tSymKeyList.end() ; symKeyIt ++ )
166             PK11_FreeSymKey( *symKeyIt ) ;
167     }
168 
169     if( !m_tPubKeyList.empty()  ) {
170         std::list< SECKEYPublicKey* >::iterator pubKeyIt ;
171 
172         for( pubKeyIt = m_tPubKeyList.begin() ; pubKeyIt != m_tPubKeyList.end() ; pubKeyIt ++ )
173             SECKEY_DestroyPublicKey( *pubKeyIt ) ;
174     }
175 
176     if( !m_tPriKeyList.empty()  ) {
177         std::list< SECKEYPrivateKey* >::iterator priKeyIt ;
178 
179         for( priKeyIt = m_tPriKeyList.begin() ; priKeyIt != m_tPriKeyList.end() ; priKeyIt ++ )
180             SECKEY_DestroyPrivateKey( *priKeyIt ) ;
181     }
182 }
183 
184 /* XInitialization */
initialize(const Sequence<Any> &)185 void SAL_CALL SecurityEnvironment_NssImpl :: initialize( const Sequence< Any >& ) throw( Exception, RuntimeException ) {
186     // TBD
187 } ;
188 
189 /* XServiceInfo */
getImplementationName()190 OUString SAL_CALL SecurityEnvironment_NssImpl :: getImplementationName() throw( RuntimeException ) {
191     return impl_getImplementationName() ;
192 }
193 
194 /* XServiceInfo */
supportsService(const OUString & serviceName)195 sal_Bool SAL_CALL SecurityEnvironment_NssImpl :: supportsService( const OUString& serviceName) throw( RuntimeException ) {
196     Sequence< OUString > seqServiceNames = getSupportedServiceNames() ;
197     const OUString* pArray = seqServiceNames.getConstArray() ;
198     for( sal_Int32 i = 0 ; i < seqServiceNames.getLength() ; i ++ ) {
199         if( *( pArray + i ) == serviceName )
200             return sal_True ;
201     }
202     return sal_False ;
203 }
204 
205 /* XServiceInfo */
getSupportedServiceNames()206 Sequence< OUString > SAL_CALL SecurityEnvironment_NssImpl :: getSupportedServiceNames() throw( RuntimeException ) {
207     return impl_getSupportedServiceNames() ;
208 }
209 
210 //Helper for XServiceInfo
impl_getSupportedServiceNames()211 Sequence< OUString > SecurityEnvironment_NssImpl :: impl_getSupportedServiceNames() {
212     ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
213     Sequence< OUString > seqServiceNames( 1 ) ;
214     seqServiceNames.getArray()[0] = OUString::createFromAscii( "com.sun.star.xml.crypto.SecurityEnvironment" ) ;
215     return seqServiceNames ;
216 }
217 
impl_getImplementationName()218 OUString SecurityEnvironment_NssImpl :: impl_getImplementationName() throw( RuntimeException ) {
219     return OUString::createFromAscii( "com.sun.star.xml.security.bridge.xmlsec.SecurityEnvironment_NssImpl" ) ;
220 }
221 
222 //Helper for registry
impl_createInstance(const Reference<XMultiServiceFactory> & aServiceManager)223 Reference< XInterface > SAL_CALL SecurityEnvironment_NssImpl :: impl_createInstance( const Reference< XMultiServiceFactory >& aServiceManager ) throw( RuntimeException ) {
224     return Reference< XInterface >( *new SecurityEnvironment_NssImpl( aServiceManager ) ) ;
225 }
226 
impl_createFactory(const Reference<XMultiServiceFactory> & aServiceManager)227 Reference< XSingleServiceFactory > SecurityEnvironment_NssImpl :: impl_createFactory( const Reference< XMultiServiceFactory >& aServiceManager ) {
228     //Reference< XSingleServiceFactory > xFactory ;
229     //xFactory = ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName , impl_createInstance , impl_getSupportedServiceNames ) ;
230     //return xFactory ;
231     return ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName() , impl_createInstance , impl_getSupportedServiceNames() ) ;
232 }
233 
234 /* XUnoTunnel */
getSomething(const Sequence<sal_Int8> & aIdentifier)235 sal_Int64 SAL_CALL SecurityEnvironment_NssImpl :: getSomething( const Sequence< sal_Int8 >& aIdentifier )
236     throw( RuntimeException )
237 {
238     if( aIdentifier.getLength() == 16 && 0 == rtl_compareMemory( getUnoTunnelId().getConstArray(), aIdentifier.getConstArray(), 16 ) ) {
239         return sal::static_int_cast<sal_Int64>(reinterpret_cast<sal_uIntPtr>(this));
240     }
241     return 0 ;
242 }
243 
244 /* XUnoTunnel extension */
getUnoTunnelId()245 const Sequence< sal_Int8>& SecurityEnvironment_NssImpl :: getUnoTunnelId() {
246     static Sequence< sal_Int8 >* pSeq = 0 ;
247     if( !pSeq ) {
248         ::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
249         if( !pSeq ) {
250             static Sequence< sal_Int8> aSeq( 16 ) ;
251             rtl_createUuid( ( sal_uInt8* )aSeq.getArray() , 0 , sal_True ) ;
252             pSeq = &aSeq ;
253         }
254     }
255     return *pSeq ;
256 }
257 
258 /* XUnoTunnel extension */
getImplementation(const Reference<XInterface> xObj)259 SecurityEnvironment_NssImpl* SecurityEnvironment_NssImpl :: getImplementation( const Reference< XInterface > xObj ) {
260     Reference< XUnoTunnel > xUT( xObj , UNO_QUERY ) ;
261     if( xUT.is() ) {
262         return reinterpret_cast<SecurityEnvironment_NssImpl*>(
263             sal::static_int_cast<sal_uIntPtr>(xUT->getSomething( getUnoTunnelId() ))) ;
264     } else
265         return NULL ;
266 }
267 
268 
getSecurityEnvironmentInformation()269 ::rtl::OUString SecurityEnvironment_NssImpl::getSecurityEnvironmentInformation() throw( ::com::sun::star::uno::RuntimeException )
270 {
271     rtl::OUString result;
272     ::rtl::OUStringBuffer buff;
273     for (CIT_SLOTS is = m_Slots.begin(); is != m_Slots.end(); is++)
274     {
275         buff.append(rtl::OUString::createFromAscii(PK11_GetTokenName(*is)));
276         buff.appendAscii("\n");
277     }
278     return buff.makeStringAndClear();
279 }
280 
addCryptoSlot(PK11SlotInfo * aSlot)281 void SecurityEnvironment_NssImpl::addCryptoSlot( PK11SlotInfo* aSlot) throw( Exception , RuntimeException )
282 {
283     PK11_ReferenceSlot(aSlot);
284     m_Slots.push_back(aSlot);
285 }
286 
getCertDb()287 CERTCertDBHandle* SecurityEnvironment_NssImpl :: getCertDb() throw( Exception , RuntimeException ) {
288     return m_pHandler ;
289 }
290 
291 //Could we have multiple cert dbs?
setCertDb(CERTCertDBHandle * aCertDb)292 void SecurityEnvironment_NssImpl :: setCertDb( CERTCertDBHandle* aCertDb ) throw( Exception , RuntimeException ) {
293     m_pHandler = aCertDb ;
294 }
295 
adoptSymKey(PK11SymKey * aSymKey)296 void SecurityEnvironment_NssImpl :: adoptSymKey( PK11SymKey* aSymKey ) throw( Exception , RuntimeException ) {
297     PK11SymKey* symkey ;
298     std::list< PK11SymKey* >::iterator keyIt ;
299 
300     if( aSymKey != NULL ) {
301         //First try to find the key in the list
302         for( keyIt = m_tSymKeyList.begin() ; keyIt != m_tSymKeyList.end() ; keyIt ++ ) {
303             if( *keyIt == aSymKey )
304                 return ;
305         }
306 
307         //If we do not find the key in the list, add a new node
308         symkey = PK11_ReferenceSymKey( aSymKey ) ;
309         if( symkey == NULL )
310             throw RuntimeException() ;
311 
312         try {
313             m_tSymKeyList.push_back( symkey ) ;
314         } catch ( Exception& ) {
315             PK11_FreeSymKey( symkey ) ;
316         }
317     }
318 }
319 
rejectSymKey(PK11SymKey * aSymKey)320 void SecurityEnvironment_NssImpl :: rejectSymKey( PK11SymKey* aSymKey ) throw( Exception , RuntimeException ) {
321     PK11SymKey* symkey ;
322     std::list< PK11SymKey* >::iterator keyIt ;
323 
324     if( aSymKey != NULL ) {
325         for( keyIt = m_tSymKeyList.begin() ; keyIt != m_tSymKeyList.end() ; keyIt ++ ) {
326             if( *keyIt == aSymKey ) {
327                 symkey = *keyIt ;
328                 PK11_FreeSymKey( symkey ) ;
329                 m_tSymKeyList.erase( keyIt ) ;
330                 break ;
331             }
332         }
333     }
334 }
335 
getSymKey(unsigned int position)336 PK11SymKey* SecurityEnvironment_NssImpl :: getSymKey( unsigned int position ) throw( Exception , RuntimeException ) {
337     PK11SymKey* symkey ;
338     std::list< PK11SymKey* >::iterator keyIt ;
339     unsigned int pos ;
340 
341     symkey = NULL ;
342     for( pos = 0, keyIt = m_tSymKeyList.begin() ; pos < position && keyIt != m_tSymKeyList.end() ; pos ++ , keyIt ++ ) ;
343 
344     if( pos == position && keyIt != m_tSymKeyList.end() )
345         symkey = *keyIt ;
346 
347     return symkey ;
348 }
349 
adoptPubKey(SECKEYPublicKey * aPubKey)350 void SecurityEnvironment_NssImpl :: adoptPubKey( SECKEYPublicKey* aPubKey ) throw( Exception , RuntimeException ) {
351     SECKEYPublicKey*    pubkey ;
352     std::list< SECKEYPublicKey* >::iterator keyIt ;
353 
354     if( aPubKey != NULL ) {
355         //First try to find the key in the list
356         for( keyIt = m_tPubKeyList.begin() ; keyIt != m_tPubKeyList.end() ; keyIt ++ ) {
357             if( *keyIt == aPubKey )
358                 return ;
359         }
360 
361         //If we do not find the key in the list, add a new node
362         pubkey = SECKEY_CopyPublicKey( aPubKey ) ;
363         if( pubkey == NULL )
364             throw RuntimeException() ;
365 
366         try {
367             m_tPubKeyList.push_back( pubkey ) ;
368         } catch ( Exception& ) {
369             SECKEY_DestroyPublicKey( pubkey ) ;
370         }
371     }
372 }
373 
rejectPubKey(SECKEYPublicKey * aPubKey)374 void SecurityEnvironment_NssImpl :: rejectPubKey( SECKEYPublicKey* aPubKey ) throw( Exception , RuntimeException ) {
375     SECKEYPublicKey*    pubkey ;
376     std::list< SECKEYPublicKey* >::iterator keyIt ;
377 
378     if( aPubKey != NULL ) {
379         for( keyIt = m_tPubKeyList.begin() ; keyIt != m_tPubKeyList.end() ; keyIt ++ ) {
380             if( *keyIt == aPubKey ) {
381                 pubkey = *keyIt ;
382                 SECKEY_DestroyPublicKey( pubkey ) ;
383                 m_tPubKeyList.erase( keyIt ) ;
384                 break ;
385             }
386         }
387     }
388 }
389 
getPubKey(unsigned int position)390 SECKEYPublicKey* SecurityEnvironment_NssImpl :: getPubKey( unsigned int position ) throw( Exception , RuntimeException ) {
391     SECKEYPublicKey* pubkey ;
392     std::list< SECKEYPublicKey* >::iterator keyIt ;
393     unsigned int pos ;
394 
395     pubkey = NULL ;
396     for( pos = 0, keyIt = m_tPubKeyList.begin() ; pos < position && keyIt != m_tPubKeyList.end() ; pos ++ , keyIt ++ ) ;
397 
398     if( pos == position && keyIt != m_tPubKeyList.end() )
399         pubkey = *keyIt ;
400 
401     return pubkey ;
402 }
403 
adoptPriKey(SECKEYPrivateKey * aPriKey)404 void SecurityEnvironment_NssImpl :: adoptPriKey( SECKEYPrivateKey* aPriKey ) throw( Exception , RuntimeException ) {
405     SECKEYPrivateKey*   prikey ;
406     std::list< SECKEYPrivateKey* >::iterator keyIt ;
407 
408     if( aPriKey != NULL ) {
409         //First try to find the key in the list
410         for( keyIt = m_tPriKeyList.begin() ; keyIt != m_tPriKeyList.end() ; keyIt ++ ) {
411             if( *keyIt == aPriKey )
412                 return ;
413         }
414 
415         //If we do not find the key in the list, add a new node
416         prikey = SECKEY_CopyPrivateKey( aPriKey ) ;
417         if( prikey == NULL )
418             throw RuntimeException() ;
419 
420         try {
421             m_tPriKeyList.push_back( prikey ) ;
422         } catch ( Exception& ) {
423             SECKEY_DestroyPrivateKey( prikey ) ;
424         }
425     }
426 }
427 
rejectPriKey(SECKEYPrivateKey * aPriKey)428 void SecurityEnvironment_NssImpl :: rejectPriKey( SECKEYPrivateKey* aPriKey ) throw( Exception , RuntimeException ) {
429     SECKEYPrivateKey*   prikey ;
430     std::list< SECKEYPrivateKey* >::iterator keyIt ;
431 
432     if( aPriKey != NULL ) {
433         for( keyIt = m_tPriKeyList.begin() ; keyIt != m_tPriKeyList.end() ; keyIt ++ ) {
434             if( *keyIt == aPriKey ) {
435                 prikey = *keyIt ;
436                 SECKEY_DestroyPrivateKey( prikey ) ;
437                 m_tPriKeyList.erase( keyIt ) ;
438                 break ;
439             }
440         }
441     }
442 }
443 
getPriKey(unsigned int position)444 SECKEYPrivateKey* SecurityEnvironment_NssImpl :: getPriKey( unsigned int position ) throw( ::com::sun::star::uno::Exception , ::com::sun::star::uno::RuntimeException )  {
445     SECKEYPrivateKey* prikey ;
446     std::list< SECKEYPrivateKey* >::iterator keyIt ;
447     unsigned int pos ;
448 
449     prikey = NULL ;
450     for( pos = 0, keyIt = m_tPriKeyList.begin() ; pos < position && keyIt != m_tPriKeyList.end() ; pos ++ , keyIt ++ ) ;
451 
452     if( pos == position && keyIt != m_tPriKeyList.end() )
453         prikey = *keyIt ;
454 
455     return prikey ;
456 }
457 
updateSlots()458 void SecurityEnvironment_NssImpl::updateSlots()
459 {
460     //In case new tokens are present then we can obtain the corresponding slot
461     PK11SlotList * soltList = NULL;
462     PK11SlotListElement * soltEle = NULL;
463     PK11SlotInfo * pSlot = NULL;
464     PK11SymKey * pSymKey = NULL;
465 
466     osl::MutexGuard guard(m_mutex);
467 
468     m_Slots.clear();
469     m_tSymKeyList.clear();
470 
471     soltList = PK11_GetAllTokens( CKM_INVALID_MECHANISM, PR_FALSE, PR_FALSE, NULL ) ;
472     if( soltList != NULL )
473     {
474         for( soltEle = soltList->head ; soltEle != NULL; soltEle = soltEle->next )
475         {
476             pSlot = soltEle->slot ;
477 
478             if(pSlot != NULL)
479             {
480                 RTL_LOGFILE_TRACE2( "XMLSEC: Found a slot: SlotName=%s, TokenName=%s", PK11_GetSlotName(pSlot), PK11_GetTokenName(pSlot) );
481 
482 //The following code which is commented out checks if a slot, that is a smart card for example, is
483 //              able to generate a symmetric key of type CKM_DES3_CBC. If this fails then this token
484 //              will not be used. This key is possibly used for the encryption service. However, all
485 //              interfaces and services used for public key signature and encryption are not published
486 //              and the encryption is not used in OOo. Therefore it does not do any harm to remove
487 //              this code, hence allowing smart cards which cannot generate this type of key.
488 //
489 //              By doing this, the encryption may fail if a smart card is being used which does not
490 //              support this key generation.
491 //
492                 pSymKey = PK11_KeyGen( pSlot , CKM_DES3_CBC, NULL, 128, NULL ) ;
493 //              if( pSymKey == NULL )
494 //              {
495 //                  PK11_FreeSlot( pSlot ) ;
496 //                  RTL_LOGFILE_TRACE( "XMLSEC: Error - pSymKey is NULL" );
497 //                  continue;
498 //              }
499                 addCryptoSlot(pSlot);
500                 PK11_FreeSlot( pSlot ) ;
501                 pSlot = NULL;
502 
503                 if (pSymKey != NULL)
504                 {
505                     adoptSymKey( pSymKey ) ;
506                     PK11_FreeSymKey( pSymKey ) ;
507                     pSymKey = NULL;
508                 }
509 
510             }// end of if(pSlot != NULL)
511         }// end of for
512     }// end of if( soltList != NULL )
513 
514 }
515 
516 
517 Sequence< Reference < XCertificate > >
getPersonalCertificates()518 SecurityEnvironment_NssImpl::getPersonalCertificates() throw( SecurityException , RuntimeException )
519 {
520     sal_Int32 length ;
521     X509Certificate_NssImpl* xcert ;
522     std::list< X509Certificate_NssImpl* > certsList ;
523 
524     updateSlots();
525     //firstly, we try to find private keys in slot
526     for (CIT_SLOTS is = m_Slots.begin(); is != m_Slots.end(); is++)
527     {
528         PK11SlotInfo *slot = *is;
529         SECKEYPrivateKeyList* priKeyList ;
530         SECKEYPrivateKeyListNode* curPri ;
531 
532         if( PK11_NeedLogin(slot ) ) {
533             SECStatus nRet = PK11_Authenticate(slot, PR_TRUE, NULL);
534             //PK11_Authenticate may fail in case the a slot has not been initialized.
535             //this is the case if the user has a new profile, so that they have never
536             //added a personal certificate.
537             if( nRet != SECSuccess && PORT_GetError() != SEC_ERROR_IO) {
538                 throw NoPasswordException();
539             }
540         }
541 
542         priKeyList = PK11_ListPrivateKeysInSlot(slot) ;
543         if( priKeyList != NULL ) {
544             for( curPri = PRIVKEY_LIST_HEAD( priKeyList );
545                 !PRIVKEY_LIST_END( curPri, priKeyList ) && curPri != NULL ;
546                 curPri = PRIVKEY_LIST_NEXT( curPri ) ) {
547                 xcert = NssPrivKeyToXCert( curPri->key ) ;
548                 if( xcert != NULL )
549                     certsList.push_back( xcert ) ;
550             }
551         }
552 
553         SECKEY_DestroyPrivateKeyList( priKeyList ) ;
554     }
555 
556     //secondly, we try to find certificate from registered private keys.
557     if( !m_tPriKeyList.empty()  ) {
558         std::list< SECKEYPrivateKey* >::iterator priKeyIt ;
559 
560         for( priKeyIt = m_tPriKeyList.begin() ; priKeyIt != m_tPriKeyList.end() ; priKeyIt ++ ) {
561             xcert = NssPrivKeyToXCert( *priKeyIt ) ;
562             if( xcert != NULL )
563                 certsList.push_back( xcert ) ;
564         }
565     }
566 
567     length = certsList.size() ;
568     if( length != 0 ) {
569         int i ;
570         std::list< X509Certificate_NssImpl* >::iterator xcertIt ;
571         Sequence< Reference< XCertificate > > certSeq( length ) ;
572 
573         for( i = 0, xcertIt = certsList.begin(); xcertIt != certsList.end(); xcertIt ++, i++ ) {
574             certSeq[i] = *xcertIt ;
575         }
576 
577         return certSeq ;
578     }
579 
580     return Sequence< Reference < XCertificate > > ();
581 }
582 
getCertificate(const OUString & issuerName,const Sequence<sal_Int8> & serialNumber)583 Reference< XCertificate > SecurityEnvironment_NssImpl :: getCertificate( const OUString& issuerName, const Sequence< sal_Int8 >& serialNumber ) throw( SecurityException , RuntimeException )
584 {
585     X509Certificate_NssImpl* xcert = NULL;
586 
587     if( m_pHandler != NULL ) {
588         CERTIssuerAndSN issuerAndSN ;
589         CERTCertificate* cert ;
590         CERTName* nmIssuer ;
591         char* chIssuer ;
592         SECItem* derIssuer ;
593         PRArenaPool* arena ;
594 
595         arena = PORT_NewArena( DER_DEFAULT_CHUNKSIZE ) ;
596         if( arena == NULL )
597             throw RuntimeException() ;
598 
599                 /*
600                  * mmi : because MS Crypto use the 'S' tag (equal to the 'ST' tag in NSS), but the NSS can't recognise
601                  *      it, so the 'S' tag should be changed to 'ST' tag
602                  *
603                  * PS  : it can work, but inside libxmlsec, the 'S' tag is till used to find cert in NSS engine, so it
604                  *       is not useful at all. (comment out now)
605                  */
606 
607                 /*
608                 sal_Int32 nIndex = 0;
609                 OUString newIssuerName;
610                 do
611                 {
612                     OUString aToken = issuerName.getToken( 0, ',', nIndex ).trim();
613                     if (aToken.compareToAscii("S=",2) == 0)
614                     {
615                         newIssuerName+=OUString::createFromAscii("ST=");
616                         newIssuerName+=aToken.copy(2);
617                     }
618                     else
619                     {
620                         newIssuerName+=aToken;
621                     }
622 
623                     if (nIndex >= 0)
624                     {
625                         newIssuerName+=OUString::createFromAscii(",");
626                     }
627                 } while ( nIndex >= 0 );
628                 */
629 
630                 /* end */
631 
632         //Create cert info from issue and serial
633         rtl::OString ostr = rtl::OUStringToOString( issuerName , RTL_TEXTENCODING_UTF8 ) ;
634         chIssuer = PL_strndup( ( char* )ostr.getStr(), ( int )ostr.getLength() ) ;
635         nmIssuer = CERT_AsciiToName( chIssuer ) ;
636         if( nmIssuer == NULL ) {
637             PL_strfree( chIssuer ) ;
638             PORT_FreeArena( arena, PR_FALSE ) ;
639 
640             /*
641              * i40394
642              *
643              * mmi : no need to throw exception
644              *       just return "no found"
645              */
646             //throw RuntimeException() ;
647             return NULL;
648         }
649 
650         derIssuer = SEC_ASN1EncodeItem( arena, NULL, ( void* )nmIssuer, SEC_ASN1_GET( CERT_NameTemplate ) ) ;
651         if( derIssuer == NULL ) {
652             PL_strfree( chIssuer ) ;
653             CERT_DestroyName( nmIssuer ) ;
654             PORT_FreeArena( arena, PR_FALSE ) ;
655             throw RuntimeException() ;
656         }
657 
658         memset( &issuerAndSN, 0, sizeof( issuerAndSN ) ) ;
659 
660         issuerAndSN.derIssuer.data = derIssuer->data ;
661         issuerAndSN.derIssuer.len = derIssuer->len ;
662 
663         issuerAndSN.serialNumber.data = ( unsigned char* )&serialNumber[0] ;
664         issuerAndSN.serialNumber.len = serialNumber.getLength() ;
665 
666         cert = CERT_FindCertByIssuerAndSN( m_pHandler, &issuerAndSN ) ;
667         if( cert != NULL ) {
668             xcert = NssCertToXCert( cert ) ;
669         } else {
670             xcert = NULL ;
671         }
672 
673         PL_strfree( chIssuer ) ;
674         CERT_DestroyName( nmIssuer ) ;
675         //SECITEM_FreeItem( derIssuer, PR_FALSE ) ;
676         CERT_DestroyCertificate( cert ) ;
677         PORT_FreeArena( arena, PR_FALSE ) ;
678     } else {
679         xcert = NULL ;
680     }
681 
682     return xcert ;
683 }
684 
getCertificate(const OUString & issuerName,const OUString & serialNumber)685 Reference< XCertificate > SecurityEnvironment_NssImpl :: getCertificate( const OUString& issuerName, const OUString& serialNumber ) throw( SecurityException , RuntimeException ) {
686     Sequence< sal_Int8 > serial = numericStringToBigInteger( serialNumber ) ;
687     return getCertificate( issuerName, serial ) ;
688 }
689 
buildCertificatePath(const Reference<XCertificate> & begin)690 Sequence< Reference < XCertificate > > SecurityEnvironment_NssImpl :: buildCertificatePath( const Reference< XCertificate >& begin ) throw( SecurityException , RuntimeException ) {
691     const X509Certificate_NssImpl* xcert ;
692     const CERTCertificate* cert ;
693     CERTCertList* certChain ;
694 
695     Reference< XUnoTunnel > xCertTunnel( begin, UNO_QUERY ) ;
696     if( !xCertTunnel.is() ) {
697         throw RuntimeException() ;
698     }
699 
700     xcert = reinterpret_cast<X509Certificate_NssImpl*>(
701         sal::static_int_cast<sal_uIntPtr>(xCertTunnel->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
702     if( xcert == NULL ) {
703         throw RuntimeException() ;
704     }
705 
706     cert = xcert->getNssCert() ;
707     if( cert != NULL ) {
708         int64 timeboundary ;
709 
710         //Get the system clock time
711         timeboundary = PR_Now() ;
712 
713         certChain = CERT_GetCertChainFromCert( ( CERTCertificate* )cert, timeboundary, certUsageAnyCA ) ;
714     } else {
715         certChain = NULL ;
716     }
717 
718     if( certChain != NULL ) {
719         X509Certificate_NssImpl* pCert ;
720         CERTCertListNode* node ;
721         int len ;
722 
723         for( len = 0, node = CERT_LIST_HEAD( certChain ); !CERT_LIST_END( node, certChain ); node = CERT_LIST_NEXT( node ), len ++ ) ;
724         Sequence< Reference< XCertificate > > xCertChain( len ) ;
725 
726         for( len = 0, node = CERT_LIST_HEAD( certChain ); !CERT_LIST_END( node, certChain ); node = CERT_LIST_NEXT( node ), len ++ ) {
727             pCert = new X509Certificate_NssImpl() ;
728             if( pCert == NULL ) {
729                 CERT_DestroyCertList( certChain ) ;
730                 throw RuntimeException() ;
731             }
732 
733             pCert->setCert( node->cert ) ;
734 
735             xCertChain[len] = pCert ;
736         }
737 
738         CERT_DestroyCertList( certChain ) ;
739 
740         return xCertChain ;
741     }
742 
743     return Sequence< Reference < XCertificate > >();
744 }
745 
createCertificateFromRaw(const Sequence<sal_Int8> & rawCertificate)746 Reference< XCertificate > SecurityEnvironment_NssImpl :: createCertificateFromRaw( const Sequence< sal_Int8 >& rawCertificate ) throw( SecurityException , RuntimeException ) {
747     X509Certificate_NssImpl* xcert ;
748 
749     if( rawCertificate.getLength() > 0 ) {
750         xcert = new X509Certificate_NssImpl() ;
751         if( xcert == NULL )
752             throw RuntimeException() ;
753 
754         xcert->setRawCert( rawCertificate ) ;
755     } else {
756         xcert = NULL ;
757     }
758 
759     return xcert ;
760 }
761 
createCertificateFromAscii(const OUString & asciiCertificate)762 Reference< XCertificate > SecurityEnvironment_NssImpl :: createCertificateFromAscii( const OUString& asciiCertificate ) throw( SecurityException , RuntimeException ) {
763     xmlChar* chCert ;
764     xmlSecSize certSize ;
765 
766     rtl::OString oscert = rtl::OUStringToOString( asciiCertificate , RTL_TEXTENCODING_ASCII_US ) ;
767 
768     chCert = xmlStrndup( ( const xmlChar* )oscert.getStr(), ( int )oscert.getLength() ) ;
769 
770     certSize = xmlSecBase64Decode( chCert, ( xmlSecByte* )chCert, xmlStrlen( chCert ) ) ;
771 
772     Sequence< sal_Int8 > rawCert( certSize ) ;
773     for( unsigned int i = 0 ; i < certSize ; i ++ )
774         rawCert[i] = *( chCert + i ) ;
775 
776     xmlFree( chCert ) ;
777 
778     return createCertificateFromRaw( rawCert ) ;
779 }
780 
781 sal_Int32 SecurityEnvironment_NssImpl ::
verifyCertificate(const Reference<csss::XCertificate> & aCert,const Sequence<Reference<csss::XCertificate>> & intermediateCerts)782 verifyCertificate( const Reference< csss::XCertificate >& aCert,
783                    const Sequence< Reference< csss::XCertificate > >&  intermediateCerts )
784     throw( ::com::sun::star::uno::SecurityException, ::com::sun::star::uno::RuntimeException )
785 {
786     sal_Int32 validity = csss::CertificateValidity::INVALID;
787     const X509Certificate_NssImpl* xcert ;
788     const CERTCertificate* cert ;
789     ::std::vector<CERTCertificate*> vecTmpNSSCertificates;
790     Reference< XUnoTunnel > xCertTunnel( aCert, UNO_QUERY ) ;
791     if( !xCertTunnel.is() ) {
792         throw RuntimeException() ;
793     }
794 
795     xmlsec_trace("Start verification of certificate: \n %s \n",
796               OUStringToOString(
797                   aCert->getSubjectName(), osl_getThreadTextEncoding()).getStr());
798 
799     xcert = reinterpret_cast<X509Certificate_NssImpl*>(
800        sal::static_int_cast<sal_uIntPtr>(xCertTunnel->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
801     if( xcert == NULL ) {
802         throw RuntimeException() ;
803     }
804 
805     //CERT_PKIXVerifyCert does not take a db as argument. It will therefore
806     //internally use CERT_GetDefaultCertDB
807     //Make sure m_pHandler is the default DB
808     OSL_ASSERT(m_pHandler == CERT_GetDefaultCertDB());
809     CERTCertDBHandle * certDb = m_pHandler != NULL ? m_pHandler : CERT_GetDefaultCertDB();
810     cert = xcert->getNssCert() ;
811     if( cert != NULL )
812     {
813 
814         //prepare the intermediate certificates
815         for (sal_Int32 i = 0; i < intermediateCerts.getLength(); i++)
816         {
817             Sequence<sal_Int8> der = intermediateCerts[i]->getEncoded();
818             SECItem item;
819             item.type = siBuffer;
820             item.data = (unsigned char*)der.getArray();
821             item.len = der.getLength();
822 
823             CERTCertificate* certTmp = CERT_NewTempCertificate(certDb, &item,
824                                            NULL     /* nickname */,
825                                            PR_FALSE /* isPerm */,
826                                            PR_TRUE  /* copyDER */);
827              if (!certTmp)
828              {
829                  xmlsec_trace("Failed to add a temporary certificate: %s",
830                            OUStringToOString(intermediateCerts[i]->getIssuerName(),
831                                              osl_getThreadTextEncoding()).getStr());
832 
833              }
834              else
835              {
836                  xmlsec_trace("Added temporary certificate: %s",
837                            certTmp->subjectName ? certTmp->subjectName : "");
838                  vecTmpNSSCertificates.push_back(certTmp);
839              }
840         }
841 
842 
843         SECStatus status ;
844 
845         CERTVerifyLog log;
846         log.arena = PORT_NewArena(512);
847         log.head = log.tail = NULL;
848         log.count = 0;
849 
850         CERT_EnableOCSPChecking(certDb);
851         CERT_DisableOCSPDefaultResponder(certDb);
852         CERTValOutParam cvout[5];
853         CERTValInParam cvin[3];
854 
855         cvin[0].type = cert_pi_useAIACertFetch;
856         cvin[0].value.scalar.b = PR_TRUE;
857 
858         PRUint64 revFlagsLeaf[2];
859         PRUint64 revFlagsChain[2];
860         CERTRevocationFlags rev;
861         rev.leafTests.number_of_defined_methods = 2;
862         rev.leafTests.cert_rev_flags_per_method = revFlagsLeaf;
863         //the flags are defined in cert.h
864         //We check both leaf and chain.
865         //It is enough if one revocation method has fresh info,
866         //but at least one must have some. Otherwise validation fails.
867         //!!! using leaf test and CERT_REV_MI_REQUIRE_SOME_FRESH_INFO_AVAILABLE
868         // when validating a root certificate will result in "revoked". Usually
869         //there is no revocation information available for the root cert because
870         //it must be trusted anyway and it does itself issue revocation information.
871         //When we use the flag here and OOo shows the certification path then the root
872         //cert is invalid while all other can be valid. It would probably best if
873         //this interface method returned the whole chain.
874         //Otherwise we need to check if the certificate is self-signed and if it is
875         //then not use the flag when doing the leaf-test.
876         rev.leafTests.cert_rev_flags_per_method[cert_revocation_method_crl] =
877             CERT_REV_M_TEST_USING_THIS_METHOD
878             | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE;
879         rev.leafTests.cert_rev_flags_per_method[cert_revocation_method_ocsp] =
880             CERT_REV_M_TEST_USING_THIS_METHOD
881             | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE;
882         rev.leafTests.number_of_preferred_methods = 0;
883         rev.leafTests.preferred_methods = NULL;
884         rev.leafTests.cert_rev_method_independent_flags =
885             CERT_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST;
886 //            | CERT_REV_MI_REQUIRE_SOME_FRESH_INFO_AVAILABLE;
887 
888         rev.chainTests.number_of_defined_methods = 2;
889         rev.chainTests.cert_rev_flags_per_method = revFlagsChain;
890         rev.chainTests.cert_rev_flags_per_method[cert_revocation_method_crl] =
891             CERT_REV_M_TEST_USING_THIS_METHOD
892             | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE;
893         rev.chainTests.cert_rev_flags_per_method[cert_revocation_method_ocsp] =
894             CERT_REV_M_TEST_USING_THIS_METHOD
895             | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE;
896         rev.chainTests.number_of_preferred_methods = 0;
897         rev.chainTests.preferred_methods = NULL;
898         rev.chainTests.cert_rev_method_independent_flags =
899             CERT_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST;
900 //            | CERT_REV_MI_REQUIRE_SOME_FRESH_INFO_AVAILABLE;
901 
902 
903         cvin[1].type = cert_pi_revocationFlags;
904         cvin[1].value.pointer.revocation = &rev;
905         // does not work, not implemented yet in 3.12.4
906 //         cvin[2].type = cert_pi_keyusage;
907 //         cvin[2].value.scalar.ui = KU_DIGITAL_SIGNATURE;
908         cvin[2].type = cert_pi_end;
909 
910         cvout[0].type = cert_po_trustAnchor;
911         cvout[0].value.pointer.cert = NULL;
912         cvout[1].type = cert_po_errorLog;
913         cvout[1].value.pointer.log = &log;
914         cvout[2].type = cert_po_end;
915 
916         // We check SSL server certificates, CA certificates and signing sertificates.
917         //
918         // ToDo check keyusage, looking at CERT_KeyUsageAndTypeForCertUsage (
919         // mozilla/security/nss/lib/certdb/certdb.c indicates that
920         // certificateUsageSSLClient, certificateUsageSSLServer and certificateUsageSSLCA
921         // are sufficient. They cover the key usages for digital signature, key agreement
922         // and encipherment and certificate signature
923 
924         //never use the following usages because they are not checked properly
925         // certificateUsageUserCertImport
926         // certificateUsageVerifyCA
927         // certificateUsageAnyCA
928         // certificateUsageProtectedObjectSigner
929 
930         UsageDescription arUsages[5];
931         arUsages[0] = UsageDescription( certificateUsageSSLClient, "certificateUsageSSLClient"  );
932         arUsages[1] = UsageDescription( certificateUsageSSLServer, "certificateUsageSSLServer"  );
933         arUsages[2] = UsageDescription( certificateUsageSSLCA, "certificateUsageSSLCA"  );
934         arUsages[3] = UsageDescription( certificateUsageEmailSigner, "certificateUsageEmailSigner" );
935         arUsages[4] = UsageDescription( certificateUsageEmailRecipient, "certificateUsageEmailRecipient" );
936 
937         int numUsages = sizeof(arUsages) / sizeof(UsageDescription);
938         for (int i = 0; i < numUsages; i++)
939         {
940             xmlsec_trace("Testing usage %d of %d: %s (0x%x)", i + 1,
941                       numUsages, arUsages[i].description, (int) arUsages[i].usage);
942 
943             status = CERT_PKIXVerifyCert(const_cast<CERTCertificate *>(cert), arUsages[i].usage,
944                                          cvin, cvout, NULL);
945             if( status == SECSuccess )
946             {
947                 xmlsec_trace("CERT_PKIXVerifyCert returned SECSuccess.");
948                 //When an intermediate or root certificate is checked then we expect the usage
949                 //certificateUsageSSLCA. This, however, will be only set when in the trust settings dialog
950                 //the button "This certificate can identify websites" is checked. If for example only
951                 //"This certificate can identify mail users" is set then the end certificate can
952                 //be validated and the returned usage will conain certificateUsageEmailRecipient.
953                 //But checking directly the root or intermediate certificate will fail. In the
954                 //certificate path view the end certificate will be shown as valid but the others
955                 //will be displayed as invalid.
956 
957                 validity = csss::CertificateValidity::VALID;
958                 xmlsec_trace("Certificate is valid.\n");
959                 CERTCertificate * issuerCert = cvout[0].value.pointer.cert;
960                 if (issuerCert)
961                 {
962                     xmlsec_trace("Root certificate: %s", issuerCert->subjectName);
963                     CERT_DestroyCertificate(issuerCert);
964                 };
965 
966                 break;
967             }
968             else
969             {
970                 PRIntn err = PR_GetError();
971                 xmlsec_trace("Error: , %d = %s", err, getCertError(err));
972 
973                 /* Display validation results */
974                 if ( log.count > 0)
975                 {
976                     CERTVerifyLogNode *node = NULL;
977                     printChainFailure(&log);
978 
979                     for (node = log.head; node; node = node->next) {
980                         if (node->cert)
981                             CERT_DestroyCertificate(node->cert);
982                     }
983                     log.head = log.tail = NULL;
984                     log.count = 0;
985                 }
986                 xmlsec_trace("Certificate is invalid.\n");
987             }
988         }
989 
990     }
991     else
992     {
993         validity = ::com::sun::star::security::CertificateValidity::INVALID ;
994     }
995 
996     //Destroying the temporary certificates
997     std::vector<CERTCertificate*>::const_iterator cert_i;
998     for (cert_i = vecTmpNSSCertificates.begin(); cert_i != vecTmpNSSCertificates.end(); cert_i++)
999     {
1000         xmlsec_trace("Destroying temporary certificate");
1001         CERT_DestroyCertificate(*cert_i);
1002     }
1003     return validity ;
1004 }
1005 
getCertificateCharacters(const::com::sun::star::uno::Reference<::com::sun::star::security::XCertificate> & aCert)1006 sal_Int32 SecurityEnvironment_NssImpl::getCertificateCharacters(
1007     const ::com::sun::star::uno::Reference< ::com::sun::star::security::XCertificate >& aCert ) throw( ::com::sun::star::uno::SecurityException, ::com::sun::star::uno::RuntimeException ) {
1008     sal_Int32 characters ;
1009     const X509Certificate_NssImpl* xcert ;
1010     const CERTCertificate* cert ;
1011 
1012     Reference< XUnoTunnel > xCertTunnel( aCert, UNO_QUERY ) ;
1013     if( !xCertTunnel.is() ) {
1014         throw RuntimeException() ;
1015     }
1016 
1017     xcert = reinterpret_cast<X509Certificate_NssImpl*>(
1018         sal::static_int_cast<sal_uIntPtr>(xCertTunnel->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
1019     if( xcert == NULL ) {
1020         throw RuntimeException() ;
1021     }
1022 
1023     cert = xcert->getNssCert() ;
1024 
1025     characters = 0x00000000 ;
1026 
1027     //Firstly, find out whether or not the cert is self-signed.
1028     if( SECITEM_CompareItem( &(cert->derIssuer), &(cert->derSubject) ) == SECEqual ) {
1029         characters |= ::com::sun::star::security::CertificateCharacters::SELF_SIGNED ;
1030     } else {
1031         characters &= ~ ::com::sun::star::security::CertificateCharacters::SELF_SIGNED ;
1032     }
1033 
1034     //Secondly, find out whether or not the cert has a private key.
1035 
1036     /*
1037      * i40394
1038      *
1039      * mmi : need to check whether the cert's slot is valid first
1040      */
1041     SECKEYPrivateKey* priKey = NULL;
1042 
1043     if (cert->slot != NULL)
1044     {
1045         priKey = PK11_FindPrivateKeyFromCert( cert->slot, ( CERTCertificate* )cert, NULL ) ;
1046     }
1047     if(priKey == NULL)
1048     {
1049         for (CIT_SLOTS is = m_Slots.begin(); is != m_Slots.end(); is++)
1050         {
1051             priKey = PK11_FindPrivateKeyFromCert(*is, (CERTCertificate*)cert, NULL);
1052             if (priKey)
1053                 break;
1054         }
1055     }
1056     if( priKey != NULL ) {
1057         characters |=  ::com::sun::star::security::CertificateCharacters::HAS_PRIVATE_KEY ;
1058 
1059         SECKEY_DestroyPrivateKey( priKey ) ;
1060     } else {
1061         characters &= ~ ::com::sun::star::security::CertificateCharacters::HAS_PRIVATE_KEY ;
1062     }
1063 
1064     return characters ;
1065 }
1066 
NssCertToXCert(CERTCertificate * cert)1067 X509Certificate_NssImpl* NssCertToXCert( CERTCertificate* cert )
1068 {
1069     X509Certificate_NssImpl* xcert ;
1070 
1071     if( cert != NULL ) {
1072         xcert = new X509Certificate_NssImpl() ;
1073         if( xcert == NULL ) {
1074             xcert = NULL ;
1075         } else {
1076             xcert->setCert( cert ) ;
1077         }
1078     } else {
1079         xcert = NULL ;
1080     }
1081 
1082     return xcert ;
1083 }
1084 
NssPrivKeyToXCert(SECKEYPrivateKey * priKey)1085 X509Certificate_NssImpl* NssPrivKeyToXCert( SECKEYPrivateKey* priKey )
1086 {
1087     CERTCertificate* cert ;
1088     X509Certificate_NssImpl* xcert ;
1089 
1090     if( priKey != NULL ) {
1091         cert = PK11_GetCertFromPrivateKey( priKey ) ;
1092 
1093         if( cert != NULL ) {
1094             xcert = NssCertToXCert( cert ) ;
1095         } else {
1096             xcert = NULL ;
1097         }
1098 
1099         CERT_DestroyCertificate( cert ) ;
1100     } else {
1101         xcert = NULL ;
1102     }
1103 
1104     return xcert ;
1105 }
1106 
1107 
1108 /* Native methods */
createKeysManager()1109 xmlSecKeysMngrPtr SecurityEnvironment_NssImpl::createKeysManager() throw( Exception, RuntimeException ) {
1110 
1111     unsigned int i ;
1112     CERTCertDBHandle* handler = NULL ;
1113     PK11SymKey* symKey = NULL ;
1114     SECKEYPublicKey* pubKey = NULL ;
1115     SECKEYPrivateKey* priKey = NULL ;
1116     xmlSecKeysMngrPtr pKeysMngr = NULL ;
1117 
1118     handler = this->getCertDb() ;
1119 
1120     /*-
1121      * The following lines is based on the private version of xmlSec-NSS
1122      * crypto engine
1123      */
1124     int cSlots = m_Slots.size();
1125     boost::scoped_array<PK11SlotInfo*> sarSlots(new PK11SlotInfo*[cSlots]);
1126     PK11SlotInfo**  slots = sarSlots.get();
1127     int count = 0;
1128     for (CIT_SLOTS islots = m_Slots.begin();islots != m_Slots.end(); islots++, count++)
1129         slots[count] = *islots;
1130 
1131     pKeysMngr = xmlSecNssAppliedKeysMngrCreate(slots, cSlots, handler ) ;
1132     if( pKeysMngr == NULL )
1133         throw RuntimeException() ;
1134 
1135     /*-
1136      * Adopt symmetric key into keys manager
1137      */
1138     for( i = 0 ; ( symKey = this->getSymKey( i ) ) != NULL ; i ++ ) {
1139         if( xmlSecNssAppliedKeysMngrSymKeyLoad( pKeysMngr, symKey ) < 0 ) {
1140             throw RuntimeException() ;
1141         }
1142     }
1143 
1144     /*-
1145      * Adopt asymmetric public key into keys manager
1146      */
1147     for( i = 0 ; ( pubKey = this->getPubKey( i ) ) != NULL ; i ++ ) {
1148         if( xmlSecNssAppliedKeysMngrPubKeyLoad( pKeysMngr, pubKey ) < 0 ) {
1149             throw RuntimeException() ;
1150         }
1151     }
1152 
1153     /*-
1154      * Adopt asymmetric private key into keys manager
1155      */
1156     for( i = 0 ; ( priKey = this->getPriKey( i ) ) != NULL ; i ++ ) {
1157         if( xmlSecNssAppliedKeysMngrPriKeyLoad( pKeysMngr, priKey ) < 0 ) {
1158             throw RuntimeException() ;
1159         }
1160     }
1161     return pKeysMngr ;
1162 }
destroyKeysManager(xmlSecKeysMngrPtr pKeysMngr)1163 void SecurityEnvironment_NssImpl::destroyKeysManager(xmlSecKeysMngrPtr pKeysMngr) throw( Exception, RuntimeException ) {
1164     if( pKeysMngr != NULL ) {
1165         xmlSecKeysMngrDestroy( pKeysMngr ) ;
1166     }
1167 }
1168