106b3ce53SAndrew Rist /**************************************************************
2cdf0e10cSrcweir *
306b3ce53SAndrew Rist * Licensed to the Apache Software Foundation (ASF) under one
406b3ce53SAndrew Rist * or more contributor license agreements. See the NOTICE file
506b3ce53SAndrew Rist * distributed with this work for additional information
606b3ce53SAndrew Rist * regarding copyright ownership. The ASF licenses this file
706b3ce53SAndrew Rist * to you under the Apache License, Version 2.0 (the
806b3ce53SAndrew Rist * "License"); you may not use this file except in compliance
906b3ce53SAndrew Rist * with the License. You may obtain a copy of the License at
1006b3ce53SAndrew Rist *
1106b3ce53SAndrew Rist * http://www.apache.org/licenses/LICENSE-2.0
1206b3ce53SAndrew Rist *
1306b3ce53SAndrew Rist * Unless required by applicable law or agreed to in writing,
1406b3ce53SAndrew Rist * software distributed under the License is distributed on an
1506b3ce53SAndrew Rist * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
1606b3ce53SAndrew Rist * KIND, either express or implied. See the License for the
1706b3ce53SAndrew Rist * specific language governing permissions and limitations
1806b3ce53SAndrew Rist * under the License.
1906b3ce53SAndrew Rist *
2006b3ce53SAndrew Rist *************************************************************/
2106b3ce53SAndrew Rist
2206b3ce53SAndrew Rist
23cdf0e10cSrcweir
24cdf0e10cSrcweir // MARKER(update_precomp.py): autogen include statement, do not remove
25cdf0e10cSrcweir #include "precompiled_xmlsecurity.hxx"
26cdf0e10cSrcweir
27cdf0e10cSrcweir #include <xsecctl.hxx>
28cdf0e10cSrcweir #include "xsecparser.hxx"
29cdf0e10cSrcweir #include <tools/debug.hxx>
30cdf0e10cSrcweir
31cdf0e10cSrcweir #include <com/sun/star/xml/crypto/sax/XKeyCollector.hpp>
32cdf0e10cSrcweir #include <com/sun/star/xml/crypto/sax/ElementMarkPriority.hpp>
33cdf0e10cSrcweir #include <com/sun/star/xml/crypto/sax/XReferenceResolvedBroadcaster.hpp>
34cdf0e10cSrcweir #include <com/sun/star/xml/crypto/sax/XReferenceCollector.hpp>
35cdf0e10cSrcweir #include <com/sun/star/xml/crypto/sax/XSignatureVerifyResultBroadcaster.hpp>
36cdf0e10cSrcweir #include <com/sun/star/xml/sax/SAXParseException.hpp>
37cdf0e10cSrcweir
38*202a5bb2SArrigo Marchiori // FIXME: copied from main/sal/rtl/source/strimp.c
rtl_ImplIsWhitespace(sal_Unicode c)39*202a5bb2SArrigo Marchiori static sal_Bool rtl_ImplIsWhitespace( sal_Unicode c )
40*202a5bb2SArrigo Marchiori {
41*202a5bb2SArrigo Marchiori /* Space or Control character? */
42*202a5bb2SArrigo Marchiori if ( (c <= 32) && c )
43*202a5bb2SArrigo Marchiori return sal_True;
44*202a5bb2SArrigo Marchiori
45*202a5bb2SArrigo Marchiori /* Only in the General Punctuation area Space or Control characters are included? */
46*202a5bb2SArrigo Marchiori if ( (c < 0x2000) || (c > 0x206F) )
47*202a5bb2SArrigo Marchiori return sal_False;
48*202a5bb2SArrigo Marchiori
49*202a5bb2SArrigo Marchiori if ( ((c >= 0x2000) && (c <= 0x200B)) || /* All Spaces */
50*202a5bb2SArrigo Marchiori (c == 0x2028) || /* LINE SEPARATOR */
51*202a5bb2SArrigo Marchiori (c == 0x2029) ) /* PARAGRAPH SEPARATOR */
52*202a5bb2SArrigo Marchiori return sal_True;
53*202a5bb2SArrigo Marchiori
54*202a5bb2SArrigo Marchiori return sal_False;
55*202a5bb2SArrigo Marchiori }
56*202a5bb2SArrigo Marchiori
57cdf0e10cSrcweir namespace cssu = com::sun::star::uno;
58cdf0e10cSrcweir namespace cssl = com::sun::star::lang;
59cdf0e10cSrcweir namespace cssxc = com::sun::star::xml::crypto;
60cdf0e10cSrcweir namespace cssxs = com::sun::star::xml::sax;
61cdf0e10cSrcweir
62cdf0e10cSrcweir /* xml security framework components */
63cdf0e10cSrcweir #define SIGNATUREVERIFIER_COMPONENT "com.sun.star.xml.crypto.sax.SignatureVerifier"
64cdf0e10cSrcweir
65cdf0e10cSrcweir /* protected: for signature verify */
prepareSignatureToRead(sal_Int32 nSecurityId)66cdf0e10cSrcweir cssu::Reference< cssxc::sax::XReferenceResolvedListener > XSecController::prepareSignatureToRead(
67cdf0e10cSrcweir sal_Int32 nSecurityId)
68cdf0e10cSrcweir {
69cdf0e10cSrcweir if ( m_nStatusOfSecurityComponents != INITIALIZED )
70cdf0e10cSrcweir {
71cdf0e10cSrcweir return NULL;
72cdf0e10cSrcweir }
73cdf0e10cSrcweir
74cdf0e10cSrcweir sal_Int32 nIdOfSignatureElementCollector;
75cdf0e10cSrcweir cssu::Reference< cssxc::sax::XReferenceResolvedListener > xReferenceResolvedListener;
76cdf0e10cSrcweir
77cdf0e10cSrcweir nIdOfSignatureElementCollector =
78cdf0e10cSrcweir m_xSAXEventKeeper->addSecurityElementCollector( cssxc::sax::ElementMarkPriority_BEFOREMODIFY, sal_False);
79cdf0e10cSrcweir
80cdf0e10cSrcweir m_xSAXEventKeeper->setSecurityId(nIdOfSignatureElementCollector, nSecurityId);
81cdf0e10cSrcweir
82cdf0e10cSrcweir /*
83cdf0e10cSrcweir * create a SignatureVerifier
84cdf0e10cSrcweir */
85cdf0e10cSrcweir cssu::Reference< cssl::XMultiComponentFactory > xMCF( mxCtx->getServiceManager() );
86cdf0e10cSrcweir xReferenceResolvedListener = cssu::Reference< cssxc::sax::XReferenceResolvedListener >(
87cdf0e10cSrcweir xMCF->createInstanceWithContext(
88cdf0e10cSrcweir rtl::OUString::createFromAscii( SIGNATUREVERIFIER_COMPONENT ), mxCtx),
89cdf0e10cSrcweir cssu::UNO_QUERY);
90cdf0e10cSrcweir
91cdf0e10cSrcweir cssu::Reference<cssl::XInitialization> xInitialization(xReferenceResolvedListener, cssu::UNO_QUERY);
92cdf0e10cSrcweir
93cdf0e10cSrcweir cssu::Sequence<cssu::Any> args(5);
94cdf0e10cSrcweir args[0] = cssu::makeAny(rtl::OUString::valueOf(nSecurityId));
95cdf0e10cSrcweir args[1] = cssu::makeAny(m_xSAXEventKeeper);
96cdf0e10cSrcweir args[2] = cssu::makeAny(rtl::OUString::valueOf(nIdOfSignatureElementCollector));
97cdf0e10cSrcweir args[3] = cssu::makeAny(m_xSecurityContext);
98cdf0e10cSrcweir args[4] = cssu::makeAny(m_xXMLSignature);
99cdf0e10cSrcweir xInitialization->initialize(args);
100cdf0e10cSrcweir
101cdf0e10cSrcweir cssu::Reference< cssxc::sax::XSignatureVerifyResultBroadcaster >
102cdf0e10cSrcweir signatureVerifyResultBroadcaster(xReferenceResolvedListener, cssu::UNO_QUERY);
103cdf0e10cSrcweir
104cdf0e10cSrcweir signatureVerifyResultBroadcaster->addSignatureVerifyResultListener( this );
105cdf0e10cSrcweir
106cdf0e10cSrcweir cssu::Reference<cssxc::sax::XReferenceResolvedBroadcaster> xReferenceResolvedBroadcaster
107cdf0e10cSrcweir (m_xSAXEventKeeper,
108cdf0e10cSrcweir cssu::UNO_QUERY);
109cdf0e10cSrcweir
110cdf0e10cSrcweir xReferenceResolvedBroadcaster->addReferenceResolvedListener(
111cdf0e10cSrcweir nIdOfSignatureElementCollector,
112cdf0e10cSrcweir xReferenceResolvedListener);
113cdf0e10cSrcweir
114cdf0e10cSrcweir cssu::Reference<cssxc::sax::XKeyCollector> keyCollector (xReferenceResolvedListener, cssu::UNO_QUERY);
115cdf0e10cSrcweir keyCollector->setKeyId(0);
116cdf0e10cSrcweir
117cdf0e10cSrcweir return xReferenceResolvedListener;
118cdf0e10cSrcweir }
119cdf0e10cSrcweir
addSignature()120cdf0e10cSrcweir void XSecController::addSignature()
121cdf0e10cSrcweir {
122cdf0e10cSrcweir cssu::Reference< cssxc::sax::XReferenceResolvedListener > xReferenceResolvedListener = NULL;
123cdf0e10cSrcweir sal_Int32 nSignatureId = 0;
124cdf0e10cSrcweir
125cdf0e10cSrcweir
126cdf0e10cSrcweir if (m_bVerifyCurrentSignature)
127cdf0e10cSrcweir {
128cdf0e10cSrcweir chainOn(true);
129cdf0e10cSrcweir xReferenceResolvedListener = prepareSignatureToRead( m_nReservedSignatureId );
130cdf0e10cSrcweir m_bVerifyCurrentSignature = false;
131cdf0e10cSrcweir nSignatureId = m_nReservedSignatureId;
132cdf0e10cSrcweir }
133cdf0e10cSrcweir
134cdf0e10cSrcweir InternalSignatureInformation isi( nSignatureId, xReferenceResolvedListener );
135cdf0e10cSrcweir m_vInternalSignatureInformations.push_back( isi );
136cdf0e10cSrcweir }
137cdf0e10cSrcweir
addReference(const rtl::OUString & ouUri)138cdf0e10cSrcweir void XSecController::addReference( const rtl::OUString& ouUri)
139cdf0e10cSrcweir {
140cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
141cdf0e10cSrcweir isi.addReference(TYPE_SAMEDOCUMENT_REFERENCE,ouUri, -1 );
142cdf0e10cSrcweir }
143cdf0e10cSrcweir
addStreamReference(const rtl::OUString & ouUri,bool isBinary)144cdf0e10cSrcweir void XSecController::addStreamReference(
145cdf0e10cSrcweir const rtl::OUString& ouUri,
146cdf0e10cSrcweir bool isBinary )
147cdf0e10cSrcweir {
148cdf0e10cSrcweir sal_Int32 type = (isBinary?TYPE_BINARYSTREAM_REFERENCE:TYPE_XMLSTREAM_REFERENCE);
149cdf0e10cSrcweir
150cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
151cdf0e10cSrcweir
152cdf0e10cSrcweir if ( isi.xReferenceResolvedListener.is() )
153cdf0e10cSrcweir {
154cdf0e10cSrcweir /*
155cdf0e10cSrcweir * get the input stream
156cdf0e10cSrcweir */
157cdf0e10cSrcweir cssu::Reference< com::sun::star::io::XInputStream > xObjectInputStream
158cdf0e10cSrcweir = getObjectInputStream( ouUri );
159cdf0e10cSrcweir
160cdf0e10cSrcweir if ( xObjectInputStream.is() )
161cdf0e10cSrcweir {
162cdf0e10cSrcweir cssu::Reference<cssxc::XUriBinding> xUriBinding
163cdf0e10cSrcweir (isi.xReferenceResolvedListener, cssu::UNO_QUERY);
164cdf0e10cSrcweir xUriBinding->setUriBinding(ouUri, xObjectInputStream);
165cdf0e10cSrcweir }
166cdf0e10cSrcweir }
167cdf0e10cSrcweir
168cdf0e10cSrcweir isi.addReference(type, ouUri, -1);
169cdf0e10cSrcweir }
170cdf0e10cSrcweir
setReferenceCount() const171cdf0e10cSrcweir void XSecController::setReferenceCount() const
172cdf0e10cSrcweir {
173cdf0e10cSrcweir const InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
174cdf0e10cSrcweir
175cdf0e10cSrcweir if ( isi.xReferenceResolvedListener.is() )
176cdf0e10cSrcweir {
177cdf0e10cSrcweir const SignatureReferenceInformations &refInfors = isi.signatureInfor.vSignatureReferenceInfors;
178cdf0e10cSrcweir
179cdf0e10cSrcweir int refNum = refInfors.size();
180cdf0e10cSrcweir sal_Int32 referenceCount = 0;
181cdf0e10cSrcweir
182cdf0e10cSrcweir for(int i=0 ; i<refNum; ++i)
183cdf0e10cSrcweir {
184cdf0e10cSrcweir if (refInfors[i].nType == TYPE_SAMEDOCUMENT_REFERENCE )
185cdf0e10cSrcweir /*
186cdf0e10cSrcweir * same-document reference
187cdf0e10cSrcweir */
188cdf0e10cSrcweir {
189cdf0e10cSrcweir referenceCount++;
190cdf0e10cSrcweir }
191cdf0e10cSrcweir }
192cdf0e10cSrcweir
193cdf0e10cSrcweir cssu::Reference<cssxc::sax::XReferenceCollector> xReferenceCollector
194cdf0e10cSrcweir (isi.xReferenceResolvedListener, cssu::UNO_QUERY);
195cdf0e10cSrcweir xReferenceCollector->setReferenceCount( referenceCount );
196cdf0e10cSrcweir }
197cdf0e10cSrcweir }
198cdf0e10cSrcweir
setIfEmpty(rtl::OUString & variable,const rtl::OUString & value)19955779ad0SArrigo Marchiori void XSecController::setIfEmpty(rtl::OUString &variable, const rtl::OUString &value) {
20055779ad0SArrigo Marchiori if (variable.getLength() == 0) {
20155779ad0SArrigo Marchiori variable = value;
20255779ad0SArrigo Marchiori } else if (variable != value) {
20355779ad0SArrigo Marchiori throw cssu::RuntimeException(rtl::OUString::createFromAscii("Value already set. Tampering?"), *this);
20455779ad0SArrigo Marchiori }
20555779ad0SArrigo Marchiori }
20655779ad0SArrigo Marchiori
setX509IssuerName(rtl::OUString & ouX509IssuerName)207cdf0e10cSrcweir void XSecController::setX509IssuerName( rtl::OUString& ouX509IssuerName )
208cdf0e10cSrcweir {
209cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
21055779ad0SArrigo Marchiori setIfEmpty(isi.signatureInfor.ouX509IssuerName, ouX509IssuerName);
211cdf0e10cSrcweir }
212cdf0e10cSrcweir
setX509SerialNumber(rtl::OUString & ouX509SerialNumber)213cdf0e10cSrcweir void XSecController::setX509SerialNumber( rtl::OUString& ouX509SerialNumber )
214cdf0e10cSrcweir {
215cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
21655779ad0SArrigo Marchiori setIfEmpty(isi.signatureInfor.ouX509SerialNumber, ouX509SerialNumber);
217cdf0e10cSrcweir }
218cdf0e10cSrcweir
setX509Certificate(rtl::OUString & ouX509Certificate)219cdf0e10cSrcweir void XSecController::setX509Certificate( rtl::OUString& ouX509Certificate )
220cdf0e10cSrcweir {
221cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
222*202a5bb2SArrigo Marchiori if (isi.signatureInfor.ouX509Certificate.getLength()) {
223*202a5bb2SArrigo Marchiori // We allow to re-set the same certificate only.
224*202a5bb2SArrigo Marchiori // Whitespace may change.
225*202a5bb2SArrigo Marchiori const sal_Int32 l1 = isi.signatureInfor.ouX509Certificate.getLength();
226*202a5bb2SArrigo Marchiori const sal_Int32 l2 = ouX509Certificate.getLength();
227*202a5bb2SArrigo Marchiori const sal_Unicode *s1 = isi.signatureInfor.ouX509Certificate.getStr();
228*202a5bb2SArrigo Marchiori const sal_Unicode *s2 = ouX509Certificate.getStr();
229*202a5bb2SArrigo Marchiori sal_Int32 i1 = 0, i2 = 0;
230*202a5bb2SArrigo Marchiori while ((i1 < l1) && (i2 < l2)) {
231*202a5bb2SArrigo Marchiori const sal_Unicode &c1 = s1[i1];
232*202a5bb2SArrigo Marchiori const sal_Unicode &c2 = s2[i2];
233*202a5bb2SArrigo Marchiori if (rtl_ImplIsWhitespace(c1)) {
234*202a5bb2SArrigo Marchiori ++i1;
235*202a5bb2SArrigo Marchiori continue;
236*202a5bb2SArrigo Marchiori }
237*202a5bb2SArrigo Marchiori if (rtl_ImplIsWhitespace(c2)) {
238*202a5bb2SArrigo Marchiori ++i2;
239*202a5bb2SArrigo Marchiori continue;
240*202a5bb2SArrigo Marchiori }
241*202a5bb2SArrigo Marchiori if (c1 != c2) {
242*202a5bb2SArrigo Marchiori throw cssu::RuntimeException(rtl::OUString::createFromAscii("Value already set. Tampering?"), *this);
243*202a5bb2SArrigo Marchiori }
244*202a5bb2SArrigo Marchiori ++i1;
245*202a5bb2SArrigo Marchiori ++i2;
246*202a5bb2SArrigo Marchiori }
247*202a5bb2SArrigo Marchiori // We could still have whitespace at the end of both strings
248*202a5bb2SArrigo Marchiori while ((i1 < l1) && rtl_ImplIsWhitespace(s1[l1])) {
249*202a5bb2SArrigo Marchiori ++i1;
250*202a5bb2SArrigo Marchiori }
251*202a5bb2SArrigo Marchiori while ((i2 < l2) && rtl_ImplIsWhitespace(s2[l2])) {
252*202a5bb2SArrigo Marchiori ++i2;
253*202a5bb2SArrigo Marchiori }
254*202a5bb2SArrigo Marchiori if ((i1 != l1) || (i2 != l2)) {
255*202a5bb2SArrigo Marchiori throw cssu::RuntimeException(rtl::OUString::createFromAscii("Value already set. Tampering?"), *this);
256*202a5bb2SArrigo Marchiori }
257*202a5bb2SArrigo Marchiori }
258*202a5bb2SArrigo Marchiori isi.signatureInfor.ouX509Certificate = ouX509Certificate;
259cdf0e10cSrcweir }
260cdf0e10cSrcweir
setSignatureValue(rtl::OUString & ouSignatureValue)261cdf0e10cSrcweir void XSecController::setSignatureValue( rtl::OUString& ouSignatureValue )
262cdf0e10cSrcweir {
263cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
264cdf0e10cSrcweir isi.signatureInfor.ouSignatureValue = ouSignatureValue;
265cdf0e10cSrcweir }
266cdf0e10cSrcweir
setDigestValue(rtl::OUString & ouDigestValue)267cdf0e10cSrcweir void XSecController::setDigestValue( rtl::OUString& ouDigestValue )
268cdf0e10cSrcweir {
269cdf0e10cSrcweir SignatureInformation &si = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1].signatureInfor;
270cdf0e10cSrcweir SignatureReferenceInformation &reference = si.vSignatureReferenceInfors[si.vSignatureReferenceInfors.size()-1];
271cdf0e10cSrcweir reference.ouDigestValue = ouDigestValue;
272cdf0e10cSrcweir }
273cdf0e10cSrcweir
setDate(rtl::OUString & ouDate)274cdf0e10cSrcweir void XSecController::setDate( rtl::OUString& ouDate )
275cdf0e10cSrcweir {
276cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
277cdf0e10cSrcweir convertDateTime( isi.signatureInfor.stDateTime, ouDate );
27855779ad0SArrigo Marchiori setIfEmpty(isi.signatureInfor.ouDateTime, ouDate);
279cdf0e10cSrcweir }
280cdf0e10cSrcweir
281cdf0e10cSrcweir /*
282cdf0e10cSrcweir void XSecController::setTime( rtl::OUString& ouTime )
283cdf0e10cSrcweir {
284cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
285cdf0e10cSrcweir isi.signatureInfor.ouTime = ouTime;
286cdf0e10cSrcweir }
287cdf0e10cSrcweir */
288cdf0e10cSrcweir
setId(rtl::OUString & ouId)289cdf0e10cSrcweir void XSecController::setId( rtl::OUString& ouId )
290cdf0e10cSrcweir {
291cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
292cdf0e10cSrcweir isi.signatureInfor.ouSignatureId = ouId;
293cdf0e10cSrcweir }
294cdf0e10cSrcweir
setPropertyId(rtl::OUString & ouPropertyId)295cdf0e10cSrcweir void XSecController::setPropertyId( rtl::OUString& ouPropertyId )
296cdf0e10cSrcweir {
297cdf0e10cSrcweir InternalSignatureInformation &isi = m_vInternalSignatureInformations[m_vInternalSignatureInformations.size()-1];
298cdf0e10cSrcweir isi.signatureInfor.ouPropertyId = ouPropertyId;
299cdf0e10cSrcweir }
300cdf0e10cSrcweir
301cdf0e10cSrcweir /* public: for signature verify */
collectToVerify(const rtl::OUString & referenceId)302cdf0e10cSrcweir void XSecController::collectToVerify( const rtl::OUString& referenceId )
303cdf0e10cSrcweir {
304cdf0e10cSrcweir /* DBG_ASSERT( m_xSAXEventKeeper.is(), "the SAXEventKeeper is NULL" ); */
305cdf0e10cSrcweir
306cdf0e10cSrcweir if ( m_nStatusOfSecurityComponents == INITIALIZED )
307cdf0e10cSrcweir /*
308cdf0e10cSrcweir * if all security components are ready, verify the signature.
309cdf0e10cSrcweir */
310cdf0e10cSrcweir {
311cdf0e10cSrcweir bool bJustChainingOn = false;
312cdf0e10cSrcweir cssu::Reference< cssxs::XDocumentHandler > xHandler = NULL;
313cdf0e10cSrcweir
314cdf0e10cSrcweir int i,j;
315cdf0e10cSrcweir int sigNum = m_vInternalSignatureInformations.size();
316cdf0e10cSrcweir
317cdf0e10cSrcweir for (i=0; i<sigNum; ++i)
318cdf0e10cSrcweir {
319cdf0e10cSrcweir InternalSignatureInformation& isi = m_vInternalSignatureInformations[i];
320cdf0e10cSrcweir SignatureReferenceInformations& vReferenceInfors = isi.signatureInfor.vSignatureReferenceInfors;
321cdf0e10cSrcweir int refNum = vReferenceInfors.size();
322cdf0e10cSrcweir
323cdf0e10cSrcweir for (j=0; j<refNum; ++j)
324cdf0e10cSrcweir {
325cdf0e10cSrcweir SignatureReferenceInformation &refInfor = vReferenceInfors[j];
326cdf0e10cSrcweir
327cdf0e10cSrcweir if (refInfor.ouURI == referenceId)
328cdf0e10cSrcweir {
329cdf0e10cSrcweir if (chainOn(false))
330cdf0e10cSrcweir {
331cdf0e10cSrcweir bJustChainingOn = true;
332cdf0e10cSrcweir xHandler = m_xSAXEventKeeper->setNextHandler(NULL);
333cdf0e10cSrcweir }
334cdf0e10cSrcweir
335cdf0e10cSrcweir sal_Int32 nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector(
336cdf0e10cSrcweir cssxc::sax::ElementMarkPriority_BEFOREMODIFY, sal_False );
337cdf0e10cSrcweir
338cdf0e10cSrcweir cssu::Reference<cssxc::sax::XReferenceResolvedBroadcaster> xReferenceResolvedBroadcaster
339cdf0e10cSrcweir (m_xSAXEventKeeper,
340cdf0e10cSrcweir cssu::UNO_QUERY );
341cdf0e10cSrcweir
342cdf0e10cSrcweir cssu::Reference<cssxc::sax::XReferenceCollector> xReferenceCollector
343cdf0e10cSrcweir ( isi.xReferenceResolvedListener, cssu::UNO_QUERY );
344cdf0e10cSrcweir
345cdf0e10cSrcweir m_xSAXEventKeeper->setSecurityId(nKeeperId, isi.signatureInfor.nSecurityId);
346cdf0e10cSrcweir xReferenceResolvedBroadcaster->addReferenceResolvedListener( nKeeperId, isi.xReferenceResolvedListener);
347cdf0e10cSrcweir xReferenceCollector->setReferenceId( nKeeperId );
348cdf0e10cSrcweir
349cdf0e10cSrcweir isi.vKeeperIds[j] = nKeeperId;
350cdf0e10cSrcweir break;
351cdf0e10cSrcweir }
352cdf0e10cSrcweir }
353cdf0e10cSrcweir }
354cdf0e10cSrcweir
355cdf0e10cSrcweir if ( bJustChainingOn )
356cdf0e10cSrcweir {
357cdf0e10cSrcweir cssu::Reference< cssxs::XDocumentHandler > xSEKHandler(m_xSAXEventKeeper, cssu::UNO_QUERY);
358cdf0e10cSrcweir if (m_xElementStackKeeper.is())
359cdf0e10cSrcweir {
360cdf0e10cSrcweir m_xElementStackKeeper->retrieve(xSEKHandler, sal_True);
361cdf0e10cSrcweir }
362cdf0e10cSrcweir m_xSAXEventKeeper->setNextHandler(xHandler);
363cdf0e10cSrcweir }
364cdf0e10cSrcweir }
365cdf0e10cSrcweir }
366cdf0e10cSrcweir
addSignature(sal_Int32 nSignatureId)367cdf0e10cSrcweir void XSecController::addSignature( sal_Int32 nSignatureId )
368cdf0e10cSrcweir {
369cdf0e10cSrcweir DBG_ASSERT( m_pXSecParser != NULL, "No XSecParser initialized" );
370cdf0e10cSrcweir
371cdf0e10cSrcweir m_nReservedSignatureId = nSignatureId;
372cdf0e10cSrcweir m_bVerifyCurrentSignature = true;
373cdf0e10cSrcweir }
374cdf0e10cSrcweir
createSignatureReader()375cdf0e10cSrcweir cssu::Reference< cssxs::XDocumentHandler > XSecController::createSignatureReader()
376cdf0e10cSrcweir {
377cdf0e10cSrcweir m_pXSecParser = new XSecParser( this, NULL );
378cdf0e10cSrcweir cssu::Reference< cssl::XInitialization > xInitialization = m_pXSecParser;
379cdf0e10cSrcweir
380cdf0e10cSrcweir setSAXChainConnector(xInitialization, NULL, NULL);
381cdf0e10cSrcweir
382cdf0e10cSrcweir return m_pXSecParser;
383cdf0e10cSrcweir }
384cdf0e10cSrcweir
releaseSignatureReader()385cdf0e10cSrcweir void XSecController::releaseSignatureReader()
386cdf0e10cSrcweir {
387cdf0e10cSrcweir clearSAXChainConnector( );
388cdf0e10cSrcweir m_pXSecParser = NULL;
389cdf0e10cSrcweir }
390cdf0e10cSrcweir
391