summaryrefslogtreecommitdiff
path: root/xmlsecurity/tools/demo/multisigdemo.cxx
diff options
context:
space:
mode:
Diffstat (limited to 'xmlsecurity/tools/demo/multisigdemo.cxx')
-rw-r--r--xmlsecurity/tools/demo/multisigdemo.cxx239
1 files changed, 239 insertions, 0 deletions
diff --git a/xmlsecurity/tools/demo/multisigdemo.cxx b/xmlsecurity/tools/demo/multisigdemo.cxx
new file mode 100644
index 000000000000..356616451ed6
--- /dev/null
+++ b/xmlsecurity/tools/demo/multisigdemo.cxx
@@ -0,0 +1,239 @@
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
+/*************************************************************************
+ *
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * Copyright 2000, 2010 Oracle and/or its affiliates.
+ *
+ * OpenOffice.org - a multi-platform office productivity suite
+ *
+ * This file is part of OpenOffice.org.
+ *
+ * OpenOffice.org is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License version 3
+ * only, as published by the Free Software Foundation.
+ *
+ * OpenOffice.org is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License version 3 for more details
+ * (a copy is included in the LICENSE file that accompanied this code).
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * version 3 along with OpenOffice.org. If not, see
+ * <http://www.openoffice.org/license.html>
+ * for a copy of the LGPLv3 License.
+ *
+ ************************************************************************/
+
+// MARKER(update_precomp.py): autogen include statement, do not remove
+#include "precompiled_xmlsecurity.hxx"
+
+#include <stdio.h>
+#include "util.hxx"
+
+#include <rtl/ustring.hxx>
+#include <cppuhelper/servicefactory.hxx>
+
+#include <xmlsecurity/biginteger.hxx>
+#include <xmlsecurity/xmlsignaturehelper.hxx>
+#include "xmlsecurity/baseencoding.hxx"
+#include <tools/date.hxx>
+#include <tools/time.hxx>
+
+using namespace ::com::sun::star;
+
+long denyVerifyHandler( void *, void * )
+{
+ return 0;
+}
+
+long startVerifyHandler( void *, void * )
+{
+ return QueryVerifySignature();
+}
+
+int SAL_CALL main( int argc, char **argv )
+{
+ if( argc < 5 )
+ {
+ fprintf( stderr, "Usage: %s <signature file 1> <signature file 2> <xml stream file> <binary stream file> [<cryptoken>]\n" , argv[0] ) ;
+ return -1 ;
+ }
+
+ uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory();
+
+ rtl::OUString aSIGFileName = rtl::OUString::createFromAscii(argv[1]);
+ rtl::OUString aSIGFileName2 = rtl::OUString::createFromAscii(argv[2]);
+ rtl::OUString aXMLFileName = rtl::OUString::createFromAscii(argv[3]);
+ rtl::OUString aBINFileName = rtl::OUString::createFromAscii(argv[4]);
+ rtl::OUString aCryptoToken;
+ if ( argc >= 7 )
+ aCryptoToken = rtl::OUString::createFromAscii(argv[6]);
+
+ sal_Int32 nSecurityId;
+ uno::Reference< io::XOutputStream > xOutputStream;
+ uno::Reference< io::XInputStream > xInputStream;
+ bool bDone;
+ SignatureInformations signatureInformations;
+ uno::Reference< ::com::sun::star::xml::sax::XDocumentHandler> xDocumentHandler;
+
+ // -------- START -------
+
+ XMLSignatureHelper aSignatureHelper( xMSF );
+
+ bool bInit = aSignatureHelper.Init( aCryptoToken );
+ if ( !bInit )
+ {
+ fprintf( stderr, "Error initializing security context!\n" );
+ return -1;
+ }
+
+ fprintf( stdout, "\n\nTEST MISSION 1: Create the first signature file\n");
+
+ aSignatureHelper.StartMission();
+
+ /*
+ * select a private key certificate
+ */
+ uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnvironment = aSignatureHelper.GetSecurityEnvironment();
+ uno::Sequence< uno::Reference< ::com::sun::star::security::XCertificate > > xPersonalCerts = xSecurityEnvironment->getPersonalCertificates() ;
+
+ fprintf( stdout, "\nPlease select two certificates:\n" );
+
+ for ( int nSig = 0; nSig < 2; nSig++ )
+ {
+ // New security ID for signature...
+ nSecurityId = aSignatureHelper.GetNewSecurityId();
+
+ // Select certificate...
+ uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true );
+ aSignatureHelper.SetX509Certificate(
+ nSecurityId, xPersonalCert->getIssuerName(),
+ bigIntegerToNumericString( xPersonalCert->getSerialNumber()),
+ baseEncode(xPersonalCert->getEncoded(), BASE64));
+ aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False );
+ aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True );
+ aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() );
+ }
+ /*
+ * creates signature
+ */
+ xOutputStream = OpenOutputStream( aSIGFileName );
+ bDone = aSignatureHelper.CreateAndWriteSignature( xOutputStream );
+ if ( !bDone )
+ fprintf( stderr, "\nSTATUS MISSION 1: Error creating Signature!\n" );
+ else
+ fprintf( stdout, "\nSTATUS MISSION 1: Signature successfully created!\n" );
+
+ aSignatureHelper.EndMission();
+
+
+ fprintf( stdout, "\n\nTEST MISSION 2: Transfer the second signature to a new signature file\n");
+
+ /*
+ * You can use an uninitialized SignatureHelper to perform this mission.
+ */
+
+ /*
+ * configures the start-verify handler. Don't need to verify for transfering...
+ */
+ aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, denyVerifyHandler ) );
+ aSignatureHelper.StartMission();
+
+ xInputStream = OpenInputStream( aSIGFileName );
+ bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
+ xInputStream->closeInput();
+
+ if ( !bDone )
+ fprintf( stderr, "\nSTATUS MISSION 2: Error in reading Signature!\n" );
+ else
+ fprintf( stdout, "\nSTATUS MISSION 2: Signature successfully transfered!\n" );
+
+ /*
+ * get all signature information
+ */
+ signatureInformations = aSignatureHelper.GetSignatureInformations();
+
+ /*
+ * write the first signature into the second signature file.
+ */
+
+ xOutputStream = OpenOutputStream( aSIGFileName2 );
+ xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream);
+ aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]);
+ aSignatureHelper.CloseDocumentHandler( xDocumentHandler);
+ aSignatureHelper.EndMission();
+
+ fprintf( stdout, "\n\nTEST MISSION 3: Insert a new signature to the first signature file\n");
+
+ aSignatureHelper.StartMission();
+
+ nSecurityId = aSignatureHelper.GetNewSecurityId();
+
+ // Select certificate...
+ uno::Reference< ::com::sun::star::security::XCertificate > xPersonalCert = getCertificateFromEnvironment( xSecurityEnvironment, true );
+ aSignatureHelper.SetX509Certificate(
+ nSecurityId, xPersonalCert->getIssuerName(),
+ bigIntegerToNumericString( xPersonalCert->getSerialNumber()),
+ baseEncode(xPersonalCert->getEncoded(), BASE64));
+ aSignatureHelper.AddForSigning( nSecurityId, aXMLFileName, aXMLFileName, sal_False );
+ aSignatureHelper.AddForSigning( nSecurityId, aBINFileName, aBINFileName, sal_True );
+ aSignatureHelper.SetDateTime( nSecurityId, Date(), Time() );
+
+
+ xOutputStream = OpenOutputStream( aSIGFileName );
+ xDocumentHandler = aSignatureHelper.CreateDocumentHandlerWithHeader( xOutputStream);
+
+ aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[0]);
+ bDone = aSignatureHelper.CreateAndWriteSignature( xDocumentHandler );
+ aSignatureHelper.ExportSignature( xDocumentHandler, signatureInformations[1]);
+ aSignatureHelper.CloseDocumentHandler( xDocumentHandler);
+
+ if ( !bDone )
+ fprintf( stderr, "\nSTATUS MISSION 3: Error creating Signature!\n" );
+ else
+ fprintf( stdout, "\nSTATUS MISSION 3: Signature successfully created!\n" );
+
+ aSignatureHelper.EndMission();
+
+ fprintf( stdout, "\n\nTEST MISSION 4 : Verify the first signature file\n");
+
+ aSignatureHelper.SetStartVerifySignatureHdl( Link( NULL, startVerifyHandler ) );
+
+ aSignatureHelper.StartMission();
+
+ xInputStream = OpenInputStream( aSIGFileName );
+ bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
+ xInputStream->closeInput();
+
+ if ( !bDone )
+ fprintf( stderr, "\nSTATUS MISSION 4: Error verifying Signatures!\n" );
+ else
+ fprintf( stdout, "\nSTATUS MISSION 4: All choosen Signatures veryfied successfully!\n" );
+
+ aSignatureHelper.EndMission();
+
+ QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() );
+
+ fprintf( stdout, "\n\nTEST MISSION 5: Verify the second signature file\n");
+
+ aSignatureHelper.StartMission();
+
+ xInputStream = OpenInputStream( aSIGFileName2 );
+ bDone = aSignatureHelper.ReadAndVerifySignature( xInputStream );
+ xInputStream->closeInput();
+
+ if ( !bDone )
+ fprintf( stderr, "\nSTATUS MISSION 5: Error verifying Signatures!\n" );
+ else
+ fprintf( stdout, "\nSTATUS MISSION 5: All choosen Signatures veryfied successfully!\n" );
+
+ aSignatureHelper.EndMission();
+
+ QueryPrintSignatureDetails( aSignatureHelper.GetSignatureInformations(), aSignatureHelper.GetSecurityEnvironment() );
+
+ return 0;
+}
+
+/* vim:set shiftwidth=4 softtabstop=4 expandtab: */