1 /*************************************************************************
2  *
3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4  *
5  * Copyright 2000, 2010 Oracle and/or its affiliates.
6  *
7  * OpenOffice.org - a multi-platform office productivity suite
8  *
9  * This file is part of OpenOffice.org.
10  *
11  * OpenOffice.org is free software: you can redistribute it and/or modify
12  * it under the terms of the GNU Lesser General Public License version 3
13  * only, as published by the Free Software Foundation.
14  *
15  * OpenOffice.org is distributed in the hope that it will be useful,
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18  * GNU Lesser General Public License version 3 for more details
19  * (a copy is included in the LICENSE file that accompanied this code).
20  *
21  * You should have received a copy of the GNU Lesser General Public License
22  * version 3 along with OpenOffice.org.  If not, see
23  * <http://www.openoffice.org/license.html>
24  * for a copy of the LGPLv3 License.
25  *
26  ************************************************************************/
27 
28 // MARKER(update_precomp.py): autogen include statement, do not remove
29 #include "precompiled_xmlsecurity.hxx"
30 #include <sal/config.h>
31 #include <rtl/uuid.h>
32 #include "securityenvironment_nssimpl.hxx"
33 
34 #ifndef _XMLSECURITYCONTEXT_NSSIMPL_HXX_
35 #include "xmlsecuritycontext_nssimpl.hxx"
36 #endif
37 #include "xmlstreamio.hxx"
38 
39 #include <sal/types.h>
40 //For reasons that escape me, this is what xmlsec does when size_t is not 4
41 #if SAL_TYPES_SIZEOFPOINTER != 4
42 #    define XMLSEC_NO_SIZE_T
43 #endif
44 #include "xmlsec/xmlsec.h"
45 #include "xmlsec/keysmngr.h"
46 #include "xmlsec/crypto.h"
47 
48 using namespace ::com::sun::star::uno ;
49 using namespace ::com::sun::star::lang ;
50 using ::com::sun::star::lang::XMultiServiceFactory ;
51 using ::com::sun::star::lang::XSingleServiceFactory ;
52 using ::rtl::OUString ;
53 
54 using ::com::sun::star::xml::crypto::XSecurityEnvironment ;
55 using ::com::sun::star::xml::crypto::XXMLSecurityContext ;
56 
57 XMLSecurityContext_NssImpl :: XMLSecurityContext_NssImpl( const Reference< XMultiServiceFactory >& aFactory )
58 	://i39448 : m_pKeysMngr( NULL ) ,
59 	m_xServiceManager( aFactory ) ,
60 	m_nDefaultEnvIndex(-1)
61 	//m_xSecurityEnvironment( NULL )
62 {
63 	//Init xmlsec library
64 	if( xmlSecInit() < 0 ) {
65 		throw RuntimeException() ;
66 	}
67 
68 	//Init xmlsec crypto engine library
69 	if( xmlSecCryptoInit() < 0 ) {
70 		xmlSecShutdown() ;
71 		throw RuntimeException() ;
72 	}
73 
74 	//Enable external stream handlers
75 	if( xmlEnableStreamInputCallbacks() < 0 ) {
76 		xmlSecCryptoShutdown() ;
77 		xmlSecShutdown() ;
78 		throw RuntimeException() ;
79 	}
80 }
81 
82 XMLSecurityContext_NssImpl :: ~XMLSecurityContext_NssImpl() {
83 #if 0 //i39448
84 	if( m_pKeysMngr != NULL ) {
85 		xmlSecKeysMngrDestroy( m_pKeysMngr ) ;
86 	}
87 #endif
88 
89 	xmlDisableStreamInputCallbacks() ;
90 	xmlSecCryptoShutdown() ;
91 	xmlSecShutdown() ;
92 }
93 
94 //i39448 : new methods
95 sal_Int32 SAL_CALL XMLSecurityContext_NssImpl::addSecurityEnvironment(
96 	const ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment >& aSecurityEnvironment)
97 	throw (::com::sun::star::security::SecurityInfrastructureException, ::com::sun::star::uno::RuntimeException)
98 {
99 	if( !aSecurityEnvironment.is() )
100 	{
101 		throw RuntimeException() ;
102 	}
103 
104 	m_vSecurityEnvironments.push_back( aSecurityEnvironment );
105 
106 	return m_vSecurityEnvironments.size() - 1 ;
107 }
108 
109 
110 sal_Int32 SAL_CALL XMLSecurityContext_NssImpl::getSecurityEnvironmentNumber(  )
111 	throw (::com::sun::star::uno::RuntimeException)
112 {
113 	return m_vSecurityEnvironments.size();
114 }
115 
116 ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL
117 	XMLSecurityContext_NssImpl::getSecurityEnvironmentByIndex( sal_Int32 index )
118 	throw (::com::sun::star::uno::RuntimeException)
119 {
120 	::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > xSecurityEnvironment;
121 
122 	if (index >= 0 && index < ( sal_Int32 )m_vSecurityEnvironments.size())
123 	{
124 		xSecurityEnvironment = m_vSecurityEnvironments[index];
125 	}
126 	else
127 		throw RuntimeException() ;
128 
129 	return xSecurityEnvironment;
130 }
131 
132 ::com::sun::star::uno::Reference< ::com::sun::star::xml::crypto::XSecurityEnvironment > SAL_CALL
133 	XMLSecurityContext_NssImpl::getSecurityEnvironment(  )
134 	throw (::com::sun::star::uno::RuntimeException)
135 {
136 	if (m_nDefaultEnvIndex >= 0 && m_nDefaultEnvIndex < ( sal_Int32 )m_vSecurityEnvironments.size())
137 		return getSecurityEnvironmentByIndex(m_nDefaultEnvIndex);
138 	else
139 		throw RuntimeException() ;
140 }
141 
142 sal_Int32 SAL_CALL XMLSecurityContext_NssImpl::getDefaultSecurityEnvironmentIndex(  )
143 	throw (::com::sun::star::uno::RuntimeException)
144 {
145 	return m_nDefaultEnvIndex ;
146 }
147 
148 void SAL_CALL XMLSecurityContext_NssImpl::setDefaultSecurityEnvironmentIndex( sal_Int32 nDefaultEnvIndex )
149 	throw (::com::sun::star::uno::RuntimeException)
150 {
151 	m_nDefaultEnvIndex = nDefaultEnvIndex;
152 }
153 
154 #if 0 //i39448 : old methods should be deleted
155 /* XXMLSecurityContext */
156 void SAL_CALL XMLSecurityContext_NssImpl :: setSecurityEnvironment( const Reference< XSecurityEnvironment >& aSecurityEnvironment ) throw( com::sun::star::security::SecurityInfrastructureException ) {
157 	PK11SlotInfo* slot ;
158 	CERTCertDBHandle* handler ;
159 	//xmlSecKeyPtr key ;
160 	//xmlSecKeyDataPtr keyData ;
161 	PK11SymKey* symKey ;
162 	SECKEYPublicKey* pubKey ;
163 	SECKEYPrivateKey* priKey ;
164 	unsigned int i ;
165 
166 	if( !aSecurityEnvironment.is() )
167 		throw RuntimeException() ;
168 
169 	m_xSecurityEnvironment = aSecurityEnvironment ;
170 
171 	//Clear key manager
172 	if( m_pKeysMngr != NULL ) {
173 		xmlSecKeysMngrDestroy( m_pKeysMngr ) ;
174 		m_pKeysMngr = NULL ;
175 	}
176 
177 	//Create key manager
178 	Reference< XUnoTunnel > xEnvTunnel( m_xSecurityEnvironment , UNO_QUERY ) ;
179 	if( !xEnvTunnel.is() ) {
180 		throw RuntimeException() ;^1
181 	}
182 
183 	SecurityEnvironment_NssImpl* pSecEnv = ( SecurityEnvironment_NssImpl* )xEnvTunnel->getSomething( SecurityEnvironment_NssImpl::getUnoTunnelId() ) ;
184 	if( pSecEnv == NULL )
185 		throw RuntimeException() ;
186 
187 	//todo
188 //	slot = pSecEnv->getCryptoSlot() ;
189 	handler = pSecEnv->getCertDb() ;
190 
191 	/*-
192 	 * The following lines is based on the private version of xmlSec-NSS
193 	 * crypto engine
194 	 */
195 	m_pKeysMngr = xmlSecNssAppliedKeysMngrCreate( slot , handler ) ;
196 	if( m_pKeysMngr == NULL )
197 		throw RuntimeException() ;
198 
199 	/*-
200 	 * Adopt symmetric key into keys manager
201 	 */
202 	for( i = 0 ; ( symKey = pSecEnv->getSymKey( i ) ) != NULL ; i ++ ) {
203 		if( xmlSecNssAppliedKeysMngrSymKeyLoad( m_pKeysMngr, symKey ) < 0 ) {
204 			throw RuntimeException() ;
205 		}
206 	}
207 
208 	/*-
209 	 * Adopt asymmetric public key into keys manager
210 	 */
211 	for( i = 0 ; ( pubKey = pSecEnv->getPubKey( i ) ) != NULL ; i ++ ) {
212 		if( xmlSecNssAppliedKeysMngrPubKeyLoad( m_pKeysMngr, pubKey ) < 0 ) {
213 			throw RuntimeException() ;
214 		}
215 	}
216 
217 	/*-
218 	 * Adopt asymmetric private key into keys manager
219 	 */
220 	for( i = 0 ; ( priKey = pSecEnv->getPriKey( i ) ) != NULL ; i ++ ) {
221 		if( xmlSecNssAppliedKeysMngrPriKeyLoad( m_pKeysMngr, priKey ) < 0 ) {
222 			throw RuntimeException() ;
223 		}
224 	}
225 }
226 
227 /* XXMLSecurityContext */
228 Reference< XSecurityEnvironment > SAL_CALL XMLSecurityContext_NssImpl :: getSecurityEnvironment()
229 	throw (RuntimeException)
230 {
231 	return	m_xSecurityEnvironment ;
232 }
233 #endif
234 
235 
236 /* XInitialization */
237 void SAL_CALL XMLSecurityContext_NssImpl :: initialize( const Sequence< Any >& /*aArguments*/ ) throw( Exception, RuntimeException ) {
238 	// TBD
239 } ;
240 
241 /* XServiceInfo */
242 OUString SAL_CALL XMLSecurityContext_NssImpl :: getImplementationName() throw( RuntimeException ) {
243 	return impl_getImplementationName() ;
244 }
245 
246 /* XServiceInfo */
247 sal_Bool SAL_CALL XMLSecurityContext_NssImpl :: supportsService( const OUString& serviceName) throw( RuntimeException ) {
248 	Sequence< OUString > seqServiceNames = getSupportedServiceNames() ;
249 	const OUString* pArray = seqServiceNames.getConstArray() ;
250 	for( sal_Int32 i = 0 ; i < seqServiceNames.getLength() ; i ++ ) {
251 		if( *( pArray + i ) == serviceName )
252 			return sal_True ;
253 	}
254 	return sal_False ;
255 }
256 
257 /* XServiceInfo */
258 Sequence< OUString > SAL_CALL XMLSecurityContext_NssImpl :: getSupportedServiceNames() throw( RuntimeException ) {
259 	return impl_getSupportedServiceNames() ;
260 }
261 
262 //Helper for XServiceInfo
263 Sequence< OUString > XMLSecurityContext_NssImpl :: impl_getSupportedServiceNames() {
264 	::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
265 	Sequence< OUString > seqServiceNames( 1 ) ;
266 	seqServiceNames.getArray()[0] = OUString::createFromAscii( "com.sun.star.xml.crypto.XMLSecurityContext" ) ;
267 	return seqServiceNames ;
268 }
269 
270 OUString XMLSecurityContext_NssImpl :: impl_getImplementationName() throw( RuntimeException ) {
271 	return OUString::createFromAscii( "com.sun.star.xml.security.bridge.xmlsec.XMLSecurityContext_NssImpl" ) ;
272 }
273 
274 //Helper for registry
275 Reference< XInterface > SAL_CALL XMLSecurityContext_NssImpl :: impl_createInstance( const Reference< XMultiServiceFactory >& aServiceManager ) throw( RuntimeException ) {
276 	return Reference< XInterface >( *new XMLSecurityContext_NssImpl( aServiceManager ) ) ;
277 }
278 
279 Reference< XSingleServiceFactory > XMLSecurityContext_NssImpl :: impl_createFactory( const Reference< XMultiServiceFactory >& aServiceManager ) {
280 	//Reference< XSingleServiceFactory > xFactory ;
281 	//xFactory = ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName , impl_createInstance , impl_getSupportedServiceNames ) ;
282 	//return xFactory ;
283 	return ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName() , impl_createInstance , impl_getSupportedServiceNames() ) ;
284 }
285 
286 #if 0 //not useful any longer
287 /* XUnoTunnel */
288 sal_Int64 SAL_CALL XMLSecurityContext_NssImpl :: getSomething( const Sequence< sal_Int8 >& aIdentifier )
289 throw (RuntimeException)
290 {
291 	if( aIdentifier.getLength() == 16 && 0 == rtl_compareMemory( getUnoTunnelId().getConstArray(), aIdentifier.getConstArray(), 16 ) ) {
292 		return ( sal_Int64 )this ;
293 	}
294 	return 0 ;
295 }
296 
297 /* XUnoTunnel extension */
298 const Sequence< sal_Int8>& XMLSecurityContext_NssImpl :: getUnoTunnelId() {
299 	static Sequence< sal_Int8 >* pSeq = 0 ;
300 	if( !pSeq ) {
301 		::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
302 		if( !pSeq ) {
303 			static Sequence< sal_Int8> aSeq( 16 ) ;
304 			rtl_createUuid( ( sal_uInt8* )aSeq.getArray() , 0 , sal_True ) ;
305 			pSeq = &aSeq ;
306 		}
307 	}
308 	return *pSeq ;
309 }
310 
311 /* XUnoTunnel extension */
312 XMLSecurityContext_NssImpl* XMLSecurityContext_NssImpl :: getImplementation( const Reference< XInterface > xObj ) {
313 	Reference< XUnoTunnel > xUT( xObj , UNO_QUERY ) ;
314 	if( xUT.is() ) {
315 		return ( XMLSecurityContext_NssImpl* )xUT->getSomething( getUnoTunnelId() ) ;
316 	} else
317 		return NULL ;
318 }
319 
320 /* Native methods */
321 xmlSecKeysMngrPtr XMLSecurityContext_NssImpl :: keysManager() throw( Exception, RuntimeException ) {
322 	return m_pKeysMngr ;
323 }
324 
325 #endif
326