1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
3 * This file is part of the LibreOffice project.
5 * This Source Code Form is subject to the terms of the Mozilla Public
6 * License, v. 2.0. If a copy of the MPL was not distributed with this
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
9 * This file incorporates work covered by the following license notice:
11 * Licensed to the Apache Software Foundation (ASF) under one or more
12 * contributor license agreements. See the NOTICE file distributed
13 * with this work for additional information regarding copyright
14 * ownership. The ASF licenses this file to you under the Apache
15 * License, Version 2.0 (the "License"); you may not use this file
16 * except in compliance with the License. You may obtain a copy of
17 * the License at http://www.apache.org/licenses/LICENSE-2.0 .
20 #include <resourcemanager.hxx>
22 #include <certificate.hxx>
23 #include <certificatechooser.hxx>
24 #include <certificateviewer.hxx>
25 #include <digitalsignaturesdialog.hxx>
26 #include <macrosecurity.hxx>
27 #include <biginteger.hxx>
28 #include <strings.hrc>
29 #include <pdfsignaturehelper.hxx>
30 #include <sax/tools/converter.hxx>
32 #include <com/sun/star/embed/XStorage.hpp>
33 #include <com/sun/star/embed/StorageFormats.hpp>
34 #include <com/sun/star/embed/XTransactedObject.hpp>
35 #include <com/sun/star/embed/ElementModes.hpp>
36 #include <com/sun/star/lang/XInitialization.hpp>
37 #include <com/sun/star/lang/XServiceInfo.hpp>
38 #include <com/sun/star/ucb/XContent.hpp>
39 #include <com/sun/star/ucb/XContentIdentifierFactory.hpp>
40 #include <com/sun/star/ucb/XCommandEnvironment.hpp>
41 #include <com/sun/star/ucb/XCommandProcessor.hpp>
42 #include <com/sun/star/ucb/Command.hpp>
43 #include <com/sun/star/uno/SecurityException.hpp>
44 #include <vcl/weld.hxx>
45 #include <vcl/svapp.hxx>
46 #include <tools/date.hxx>
47 #include <tools/time.hxx>
48 #include <unotools/securityoptions.hxx>
49 #include <com/sun/star/security/CertificateValidity.hpp>
50 #include <com/sun/star/security/CertificateKind.hpp>
51 #include <comphelper/base64.hxx>
52 #include <comphelper/documentconstants.hxx>
53 #include <comphelper/propertyvalue.hxx>
54 #include <comphelper/sequence.hxx>
55 #include <cppuhelper/implbase.hxx>
56 #include <comphelper/xmlsechelper.hxx>
57 #include <cppuhelper/supportsservice.hxx>
58 #include <sal/log.hxx>
59 #include <com/sun/star/lang/IllegalArgumentException.hpp>
60 #include <com/sun/star/security/XDocumentDigitalSignatures.hpp>
61 #include <com/sun/star/xml/crypto/XXMLSecurityContext.hpp>
62 #include <sfx2/digitalsignatures.hxx>
67 using namespace css::uno
;
68 using namespace css::lang
;
69 using namespace css::security
;
70 using namespace css::xml::crypto
;
73 class DocumentDigitalSignatures
74 : public cppu::WeakImplHelper
<css::security::XDocumentDigitalSignatures
,
75 css::lang::XInitialization
, css::lang::XServiceInfo
>,
76 public sfx2::DigitalSignatures
79 css::uno::Reference
<css::uno::XComponentContext
> mxCtx
;
80 css::uno::Reference
<css::awt::XWindow
> mxParentWindow
;
82 /// will be set by XInitialization. If not we assume true. false means an earlier version (whatever that means,
83 /// this is a string, not a boolean).
84 /// Note that the code talks about "ODF version" even if this class is also used to sign OOXML.
85 OUString m_sODFVersion
;
86 /// The number of arguments which were passed in XInitialization::initialize
87 int m_nArgumentsCount
;
88 /// Indicates if the document already contains a document signature
89 bool m_bHasDocumentSignature
;
91 /// @throws css::uno::RuntimeException
92 bool ImplViewSignatures(const css::uno::Reference
<css::embed::XStorage
>& rxStorage
,
93 const css::uno::Reference
<css::io::XStream
>& xSignStream
,
94 DocumentSignatureMode eMode
, bool bReadOnly
);
95 /// @throws css::uno::RuntimeException
96 void ImplViewSignatures(const css::uno::Reference
<css::embed::XStorage
>& rxStorage
,
97 const css::uno::Reference
<css::io::XInputStream
>& xSignStream
,
98 DocumentSignatureMode eMode
, bool bReadOnly
);
99 /// @throws css::uno::RuntimeException
100 css::uno::Sequence
<css::security::DocumentSignatureInformation
>
101 ImplVerifySignatures(const css::uno::Reference
<css::embed::XStorage
>& rxStorage
,
102 const ::com::sun::star::uno::Reference
<css::io::XInputStream
>& xSignStream
,
103 DocumentSignatureMode eMode
);
105 css::uno::Sequence
<css::uno::Reference
<css::security::XCertificate
>>
106 chooseCertificatesImpl(std::map
<OUString
, OUString
>& rProperties
, const UserAction eAction
,
107 const CertificateKind certificateKind
=CertificateKind_NONE
);
110 signWithCertificateImpl(const uno::Reference
<frame::XModel
>& /*xModel*/,
111 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
112 css::uno::Reference
<css::embed::XStorage
> const& xStorage
,
113 css::uno::Reference
<css::io::XStream
> const& xStream
,
114 DocumentSignatureMode eMode
);
117 explicit DocumentDigitalSignatures(
118 const css::uno::Reference
<css::uno::XComponentContext
>& rxCtx
);
121 void SAL_CALL
initialize(const css::uno::Sequence
<css::uno::Any
>& aArguments
) override
;
123 OUString SAL_CALL
getImplementationName() override
;
125 sal_Bool SAL_CALL
supportsService(OUString
const& ServiceName
) override
;
127 css::uno::Sequence
<OUString
> SAL_CALL
getSupportedServiceNames() override
;
129 // XDocumentDigitalSignatures
131 signDocumentContent(const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
132 const css::uno::Reference
<css::io::XStream
>& xSignStream
) override
;
133 sal_Bool SAL_CALL
signSignatureLine(
134 const css::uno::Reference
<css::embed::XStorage
>& Storage
,
135 const css::uno::Reference
<css::io::XStream
>& xSignStream
, const OUString
& aSignatureLineId
,
136 const Reference
<css::security::XCertificate
>& xCertificate
,
137 const Reference
<css::graphic::XGraphic
>& xValidGraphic
,
138 const Reference
<css::graphic::XGraphic
>& xInvalidGraphic
,
139 const OUString
& aComment
) override
;
140 css::uno::Sequence
<css::security::DocumentSignatureInformation
>
141 SAL_CALL
verifyDocumentContentSignatures(
142 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
143 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
144 void SAL_CALL
showDocumentContentSignatures(
145 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
146 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
147 OUString SAL_CALL
getDocumentContentSignatureDefaultStreamName() override
;
149 signScriptingContent(const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
150 const css::uno::Reference
<css::io::XStream
>& xSignStream
) override
;
151 css::uno::Sequence
<css::security::DocumentSignatureInformation
>
152 SAL_CALL
verifyScriptingContentSignatures(
153 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
154 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
155 void SAL_CALL
showScriptingContentSignatures(
156 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
157 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
158 OUString SAL_CALL
getScriptingContentSignatureDefaultStreamName() override
;
160 signPackage(const css::uno::Reference
<css::embed::XStorage
>& Storage
,
161 const css::uno::Reference
<css::io::XStream
>& xSignStream
) override
;
162 css::uno::Sequence
<css::security::DocumentSignatureInformation
>
163 SAL_CALL
verifyPackageSignatures(
164 const css::uno::Reference
<css::embed::XStorage
>& Storage
,
165 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
167 showPackageSignatures(const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
168 const css::uno::Reference
<css::io::XInputStream
>& xSignInStream
) override
;
169 OUString SAL_CALL
getPackageSignatureDefaultStreamName() override
;
171 showCertificate(const css::uno::Reference
<css::security::XCertificate
>& Certificate
) override
;
172 void SAL_CALL
manageTrustedSources() override
;
174 isAuthorTrusted(const css::uno::Reference
<css::security::XCertificate
>& Author
) override
;
175 sal_Bool SAL_CALL
isLocationTrusted(const OUString
& Location
) override
;
176 void SAL_CALL
addAuthorToTrustedSources(
177 const css::uno::Reference
<css::security::XCertificate
>& Author
) override
;
178 void SAL_CALL
addLocationToTrustedSources(const OUString
& Location
) override
;
180 css::uno::Reference
<css::security::XCertificate
>
181 SAL_CALL
chooseCertificate(OUString
& rDescription
) override
;
182 css::uno::Reference
<css::security::XCertificate
>
183 SAL_CALL
chooseSigningCertificate(OUString
& rDescription
) override
;
184 css::uno::Reference
<css::security::XCertificate
>
185 SAL_CALL
selectSigningCertificate(OUString
& rDescription
) override
;
186 css::uno::Reference
<css::security::XCertificate
>
187 SAL_CALL
selectSigningCertificateWithType(const CertificateKind certificateKind
,
188 OUString
& rDescription
) override
;
189 css::uno::Sequence
<css::uno::Reference
<css::security::XCertificate
>>
190 SAL_CALL
chooseEncryptionCertificate() override
;
191 css::uno::Reference
<css::security::XCertificate
> SAL_CALL
chooseCertificateWithProps(
192 css::uno::Sequence
<::com::sun::star::beans::PropertyValue
>& Properties
) override
;
194 sal_Bool SAL_CALL
signDocumentWithCertificate(
195 css::uno::Reference
<css::security::XCertificate
> const & xCertificate
,
196 css::uno::Reference
<css::embed::XStorage
> const & xStoragexStorage
,
197 css::uno::Reference
<css::io::XStream
> const & xStream
) override
;
199 sal_Bool SAL_CALL
signPackageWithCertificate(
200 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
201 css::uno::Reference
<css::embed::XStorage
> const& xStoragexStorage
,
202 css::uno::Reference
<css::io::XStream
> const& xStream
) override
;
204 sal_Bool SAL_CALL
signScriptingContentWithCertificate(
205 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
206 css::uno::Reference
<css::embed::XStorage
> const& xStoragexStorage
,
207 css::uno::Reference
<css::io::XStream
> const& xStream
) override
;
209 void SAL_CALL
setParentWindow(const css::uno::Reference
<css::awt::XWindow
>& rParentwindow
) override
211 mxParentWindow
= rParentwindow
;
214 /// See sfx2::DigitalSignatures::SignModelWithCertificate().
216 SignModelWithCertificate(const css::uno::Reference
<css::frame::XModel
>& xModel
,
217 const css::uno::Reference
<css::security::XCertificate
>& xCertificate
,
218 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
219 const css::uno::Reference
<css::io::XStream
>& xStream
) override
;
224 DocumentDigitalSignatures::DocumentDigitalSignatures( const Reference
< XComponentContext
>& rxCtx
):
226 m_sODFVersion(ODFVER_013_TEXT
),
227 m_nArgumentsCount(0),
228 m_bHasDocumentSignature(false)
232 void DocumentDigitalSignatures::initialize( const Sequence
< Any
>& aArguments
)
234 if (aArguments
.getLength() > 2)
235 throw css::lang::IllegalArgumentException(
236 "DocumentDigitalSignatures::initialize requires zero, one, or two arguments",
237 static_cast<XInitialization
*>(this), 0);
239 m_nArgumentsCount
= aArguments
.getLength();
241 if (!aArguments
.hasElements())
244 if (!(aArguments
[0] >>= m_sODFVersion
))
245 throw css::lang::IllegalArgumentException(
246 "DocumentDigitalSignatures::initialize: the first arguments must be a string",
247 static_cast<XInitialization
*>(this), 0);
249 if (aArguments
.getLength() == 2
250 && !(aArguments
[1] >>= m_bHasDocumentSignature
))
251 throw css::lang::IllegalArgumentException(
252 "DocumentDigitalSignatures::initialize: the second arguments must be a bool",
253 static_cast<XInitialization
*>(this), 1);
255 //the Version is supported as of ODF1.2, so for and 1.1 document or older we will receive the
256 //an empty string. In this case we set it to ODFVER_010_TEXT. Then we can later check easily
257 //if initialize was called. Only then m_sODFVersion.getLength() is greater than 0
258 if (m_sODFVersion
.isEmpty())
259 m_sODFVersion
= ODFVER_010_TEXT
;
262 OUString
DocumentDigitalSignatures::getImplementationName()
264 return "com.sun.star.security.DocumentDigitalSignatures";
267 sal_Bool
DocumentDigitalSignatures::supportsService(
268 OUString
const & ServiceName
)
270 return cppu::supportsService(this, ServiceName
);
273 css::uno::Sequence
<OUString
>
274 DocumentDigitalSignatures::getSupportedServiceNames()
276 Sequence
<OUString
> aRet
{ "com.sun.star.security.DocumentDigitalSignatures" };
280 sal_Bool
DocumentDigitalSignatures::signDocumentContent(
281 const Reference
< css::embed::XStorage
>& rxStorage
,
282 const Reference
< css::io::XStream
>& xSignStream
)
284 OSL_ENSURE(!m_sODFVersion
.isEmpty(), "DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
285 return ImplViewSignatures( rxStorage
, xSignStream
, DocumentSignatureMode::Content
, false );
288 sal_Bool
DocumentDigitalSignatures::signSignatureLine(
289 const Reference
<css::embed::XStorage
>& rxStorage
,
290 const Reference
<css::io::XStream
>& xSignStream
,
291 const OUString
& aSignatureLineId
,
292 const Reference
<css::security::XCertificate
>& xCertificate
,
293 const Reference
<css::graphic::XGraphic
>& xValidGraphic
,
294 const Reference
<css::graphic::XGraphic
>& xInvalidGraphic
,
295 const OUString
& aComment
)
297 OSL_ENSURE(!m_sODFVersion
.isEmpty(),
298 "DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
300 DocumentSignatureManager
aSignatureManager(mxCtx
, DocumentSignatureMode::Content
);
302 if (!aSignatureManager
.init())
305 aSignatureManager
.setStore(rxStorage
);
306 aSignatureManager
.getSignatureHelper().SetStorage(rxStorage
, m_sODFVersion
);
307 aSignatureManager
.setSignatureStream(xSignStream
);
309 Reference
<XXMLSecurityContext
> xSecurityContext
;
310 Reference
<XServiceInfo
> xServiceInfo(xCertificate
, UNO_QUERY
);
311 if (xServiceInfo
->getImplementationName()
312 == "com.sun.star.xml.security.gpg.XCertificate_GpgImpl")
313 xSecurityContext
= aSignatureManager
.getGpgSecurityContext();
315 xSecurityContext
= aSignatureManager
.getSecurityContext();
317 sal_Int32 nSecurityId
;
318 bool bSuccess
= aSignatureManager
.add(xCertificate
, xSecurityContext
, aComment
, nSecurityId
,
319 true, aSignatureLineId
, xValidGraphic
, xInvalidGraphic
);
323 // Need to have this to verify the signature
324 aSignatureManager
.read(/*bUseTempStream=*/true, /*bCacheLastSignature=*/false);
325 aSignatureManager
.write(true);
327 if (rxStorage
.is() && !xSignStream
.is())
329 uno::Reference
<embed::XTransactedObject
> xTrans(rxStorage
, uno::UNO_QUERY
);
336 Sequence
< css::security::DocumentSignatureInformation
>
337 DocumentDigitalSignatures::verifyDocumentContentSignatures(
338 const Reference
< css::embed::XStorage
>& rxStorage
,
339 const Reference
< css::io::XInputStream
>& xSignInStream
)
341 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
342 return ImplVerifySignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Content
);
345 void DocumentDigitalSignatures::showDocumentContentSignatures(
346 const Reference
< css::embed::XStorage
>& rxStorage
,
347 const Reference
< css::io::XInputStream
>& xSignInStream
)
349 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
350 ImplViewSignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Content
, true );
353 OUString
DocumentDigitalSignatures::getDocumentContentSignatureDefaultStreamName()
355 return DocumentSignatureHelper::GetDocumentContentSignatureDefaultStreamName();
358 sal_Bool
DocumentDigitalSignatures::signScriptingContent(
359 const Reference
< css::embed::XStorage
>& rxStorage
,
360 const Reference
< css::io::XStream
>& xSignStream
)
362 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
363 OSL_ENSURE(m_nArgumentsCount
== 2, "DocumentDigitalSignatures: Service was not initialized properly");
364 return ImplViewSignatures( rxStorage
, xSignStream
, DocumentSignatureMode::Macros
, false );
367 Sequence
< css::security::DocumentSignatureInformation
>
368 DocumentDigitalSignatures::verifyScriptingContentSignatures(
369 const Reference
< css::embed::XStorage
>& rxStorage
,
370 const Reference
< css::io::XInputStream
>& xSignInStream
)
372 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
373 return ImplVerifySignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Macros
);
376 void DocumentDigitalSignatures::showScriptingContentSignatures(
377 const Reference
< css::embed::XStorage
>& rxStorage
,
378 const Reference
< css::io::XInputStream
>& xSignInStream
)
380 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
381 ImplViewSignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Macros
, true );
384 OUString
DocumentDigitalSignatures::getScriptingContentSignatureDefaultStreamName()
386 return DocumentSignatureHelper::GetScriptingContentSignatureDefaultStreamName();
390 sal_Bool
DocumentDigitalSignatures::signPackage(
391 const Reference
< css::embed::XStorage
>& rxStorage
,
392 const Reference
< css::io::XStream
>& xSignStream
)
394 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
395 return ImplViewSignatures( rxStorage
, xSignStream
, DocumentSignatureMode::Package
, false );
398 Sequence
< css::security::DocumentSignatureInformation
>
399 DocumentDigitalSignatures::verifyPackageSignatures(
400 const Reference
< css::embed::XStorage
>& rxStorage
,
401 const Reference
< css::io::XInputStream
>& xSignInStream
)
403 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
404 return ImplVerifySignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Package
);
407 void DocumentDigitalSignatures::showPackageSignatures(
408 const Reference
< css::embed::XStorage
>& rxStorage
,
409 const Reference
< css::io::XInputStream
>& xSignInStream
)
411 OSL_ENSURE(!m_sODFVersion
.isEmpty(),"DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
412 ImplViewSignatures( rxStorage
, xSignInStream
, DocumentSignatureMode::Package
, true );
415 OUString
DocumentDigitalSignatures::getPackageSignatureDefaultStreamName( )
417 return DocumentSignatureHelper::GetPackageSignatureDefaultStreamName();
421 void DocumentDigitalSignatures::ImplViewSignatures(
422 const Reference
< css::embed::XStorage
>& rxStorage
,
423 const Reference
< css::io::XInputStream
>& xSignStream
,
424 DocumentSignatureMode eMode
, bool bReadOnly
)
426 Reference
< io::XStream
> xStream
;
427 if ( xSignStream
.is() )
428 xStream
.set( xSignStream
, UNO_QUERY
);
429 ImplViewSignatures( rxStorage
, xStream
, eMode
, bReadOnly
);
432 bool DocumentDigitalSignatures::ImplViewSignatures(
433 const Reference
< css::embed::XStorage
>& rxStorage
, const Reference
< css::io::XStream
>& xSignStream
,
434 DocumentSignatureMode eMode
, bool bReadOnly
)
436 bool bChanges
= false;
437 auto xSignaturesDialog
= std::make_shared
<DigitalSignaturesDialog
>(
438 Application::GetFrameWeld(mxParentWindow
), mxCtx
, eMode
, bReadOnly
, m_sODFVersion
,
439 m_bHasDocumentSignature
);
440 bool bInit
= xSignaturesDialog
->Init();
441 SAL_WARN_IF( !bInit
, "xmlsecurity.comp", "Error initializing security context!" );
444 xSignaturesDialog
->SetStorage(rxStorage
);
446 xSignaturesDialog
->SetSignatureStream( xSignStream
);
450 xSignaturesDialog
->beforeRun();
451 weld::DialogController::runAsync(xSignaturesDialog
, [] (sal_Int32
) {});
454 else if (xSignaturesDialog
->run() == RET_OK
)
456 if (xSignaturesDialog
->SignaturesChanged())
459 // If we have a storage and no stream, we are responsible for commit
460 if ( rxStorage
.is() && !xSignStream
.is() )
462 uno::Reference
< embed::XTransactedObject
> xTrans( rxStorage
, uno::UNO_QUERY
);
470 std::unique_ptr
<weld::MessageDialog
> xBox(Application::CreateMessageDialog(Application::GetFrameWeld(mxParentWindow
),
471 VclMessageType::Warning
, VclButtonsType::Ok
,
472 XsResId(RID_XMLSECWB_NO_MOZILLA_PROFILE
)));
479 Sequence
< css::security::DocumentSignatureInformation
>
480 DocumentDigitalSignatures::ImplVerifySignatures(
481 const Reference
< css::embed::XStorage
>& rxStorage
,
482 const Reference
< css::io::XInputStream
>& xSignStream
, DocumentSignatureMode eMode
)
484 DocumentSignatureManager
aSignatureManager(mxCtx
, eMode
);
486 bool bInit
= aSignatureManager
.init();
488 SAL_WARN_IF(!bInit
, "xmlsecurity.comp", "Error initializing security context!");
495 if (xSignStream
.is())
497 // Something not ZIP-based, try PDF.
498 PDFSignatureHelper
& rSignatureHelper
= aSignatureManager
.getPDFSignatureHelper();
499 if (rSignatureHelper
.ReadAndVerifySignature(xSignStream
))
500 return rSignatureHelper
.GetDocumentSignatureInformations(aSignatureManager
.getSecurityEnvironment());
503 SAL_WARN( "xmlsecurity.comp", "Error, no XStorage provided");
504 return Sequence
<css::security::DocumentSignatureInformation
>();
506 // First check for the InputStream, to avoid unnecessary initialization of the security environment...
507 SignatureStreamHelper aStreamHelper
;
508 Reference
< io::XInputStream
> xInputStream
= xSignStream
;
510 if ( !xInputStream
.is() )
512 aStreamHelper
= DocumentSignatureHelper::OpenSignatureStream( rxStorage
, embed::ElementModes::READ
, eMode
);
513 if ( aStreamHelper
.xSignatureStream
.is() )
514 xInputStream
.set( aStreamHelper
.xSignatureStream
, UNO_QUERY
);
517 if (!xInputStream
.is() && aStreamHelper
.nStorageFormat
!= embed::StorageFormats::OFOPXML
)
521 XMLSignatureHelper
& rSignatureHelper
= aSignatureManager
.getSignatureHelper();
522 rSignatureHelper
.SetStorage(rxStorage
, m_sODFVersion
);
524 rSignatureHelper
.StartMission(aSignatureManager
.getSecurityContext());
526 if (xInputStream
.is())
527 rSignatureHelper
.ReadAndVerifySignature(xInputStream
);
528 else if (aStreamHelper
.nStorageFormat
== embed::StorageFormats::OFOPXML
)
529 rSignatureHelper
.ReadAndVerifySignatureStorage(aStreamHelper
.xSignatureStorage
);
531 rSignatureHelper
.EndMission();
533 uno::Reference
<xml::crypto::XSecurityEnvironment
> xSecEnv
= aSignatureManager
.getSecurityEnvironment();
534 uno::Reference
<xml::crypto::XSecurityEnvironment
> xGpgSecEnv
= aSignatureManager
.getGpgSecurityEnvironment();
536 SignatureInformations aSignInfos
= rSignatureHelper
.GetSignatureInformations();
537 int nInfos
= aSignInfos
.size();
538 Sequence
< css::security::DocumentSignatureInformation
> aInfos(nInfos
);
539 css::security::DocumentSignatureInformation
* arInfos
= aInfos
.getArray();
541 for (int n
= 0; n
< nInfos
; ++n
)
543 DocumentSignatureAlgorithm mode
544 = DocumentSignatureHelper::getDocumentAlgorithm(m_sODFVersion
, aSignInfos
[n
]);
545 const std::vector
<OUString
> aElementsToBeVerified
546 = DocumentSignatureHelper::CreateElementList(rxStorage
, eMode
, mode
);
548 const SignatureInformation
& rInfo
= aSignInfos
[n
];
549 css::security::DocumentSignatureInformation
& rSigInfo
= arInfos
[n
];
551 if (!rInfo
.X509Datas
.empty()) // X.509
553 std::vector
<uno::Reference
<XCertificate
>> certs(
554 rSignatureHelper
.CheckAndUpdateSignatureInformation(
558 rSigInfo
.CertificateStatus
= css::security::CertificateValidity::INVALID
;
562 rSigInfo
.Signer
= certs
.back();
563 // get only intermediates
565 // On Windows checking the certificate path is buggy. It does name matching (issuer, subject name)
566 // to find the parent certificate. It does not take into account that there can be several certificates
567 // with the same subject name.
570 rSigInfo
.CertificateStatus
= xSecEnv
->verifyCertificate(
571 rSigInfo
.Signer
, comphelper::containerToSequence(certs
));
573 catch (SecurityException
&)
575 SAL_WARN("xmlsecurity.comp", "Verification of certificate failed");
576 rSigInfo
.CertificateStatus
= css::security::CertificateValidity::INVALID
;
580 else if (!rInfo
.ouGpgCertificate
.isEmpty() && xGpgSecEnv
.is()) // GPG
582 // TODO not ideal to retrieve cert by keyID, might
583 // collide, or PGPKeyID format might change - can't we
584 // keep the xCert itself in rInfo?
585 rSigInfo
.Signer
= xGpgSecEnv
->getCertificate(
586 rInfo
.ouGpgKeyID
, xmlsecurity::numericStringToBigInteger(u
""));
587 rSigInfo
.CertificateStatus
= xGpgSecEnv
->verifyCertificate(
588 rSigInfo
.Signer
, Sequence
<Reference
<css::security::XCertificate
>>());
591 // Time support again (#i38744#)
592 Date
aDate(rInfo
.stDateTime
.Day
, rInfo
.stDateTime
.Month
, rInfo
.stDateTime
.Year
);
593 tools::Time
aTime(rInfo
.stDateTime
.Hours
, rInfo
.stDateTime
.Minutes
,
594 rInfo
.stDateTime
.Seconds
, rInfo
.stDateTime
.NanoSeconds
);
595 rSigInfo
.SignatureDate
= aDate
.GetDate();
596 rSigInfo
.SignatureTime
= aTime
.GetTime() / tools::Time::nanoPerCenti
;
598 rSigInfo
.SignatureIsValid
599 = (rInfo
.nStatus
== css::xml::crypto::SecurityOperationStatus_OPERATION_SUCCEEDED
);
601 // Signature line info (ID + Images)
602 if (!rInfo
.ouSignatureLineId
.isEmpty())
603 rSigInfo
.SignatureLineId
= rInfo
.ouSignatureLineId
;
605 if (rInfo
.aValidSignatureImage
.is())
606 rSigInfo
.ValidSignatureLineImage
= rInfo
.aValidSignatureImage
;
608 if (rInfo
.aInvalidSignatureImage
.is())
609 rSigInfo
.InvalidSignatureLineImage
= rInfo
.aInvalidSignatureImage
;
611 // OOXML intentionally doesn't sign metadata.
612 if (rSigInfo
.SignatureIsValid
613 && aStreamHelper
.nStorageFormat
!= embed::StorageFormats::OFOPXML
)
615 rSigInfo
.SignatureIsValid
= DocumentSignatureHelper::checkIfAllFilesAreSigned(
616 aElementsToBeVerified
, rInfo
, mode
);
618 if (eMode
== DocumentSignatureMode::Content
)
620 if (aStreamHelper
.nStorageFormat
== embed::StorageFormats::OFOPXML
)
621 rSigInfo
.PartialDocumentSignature
= true;
623 rSigInfo
.PartialDocumentSignature
624 = !DocumentSignatureHelper::isOOo3_2_Signature(aSignInfos
[n
]);
632 void DocumentDigitalSignatures::manageTrustedSources( )
635 // SecEnv is only needed to display certificate information from trusted sources.
636 // Macro Security also has some options where no security environment is needed, so raise dialog anyway.
637 // Later I should change the code so the Dialog creates the SecEnv on demand...
639 Reference
< css::xml::crypto::XSecurityEnvironment
> xSecEnv
;
641 DocumentSignatureManager
aSignatureManager(mxCtx
, {});
642 if (aSignatureManager
.init())
643 xSecEnv
= aSignatureManager
.getSecurityEnvironment();
645 MacroSecurity
aDlg(Application::GetFrameWeld(mxParentWindow
), xSecEnv
);
649 void DocumentDigitalSignatures::showCertificate(
650 const Reference
< css::security::XCertificate
>& Certificate
)
652 DocumentSignatureManager
aSignatureManager(mxCtx
, {});
654 bool bInit
= aSignatureManager
.init();
656 SAL_WARN_IF( !bInit
, "xmlsecurity.comp", "Error initializing security context!" );
660 CertificateViewer
aViewer(Application::GetFrameWeld(mxParentWindow
), aSignatureManager
.getSecurityEnvironment(), Certificate
, false, nullptr);
665 sal_Bool
DocumentDigitalSignatures::isAuthorTrusted(
666 const Reference
<css::security::XCertificate
>& xAuthor
)
672 OUString sSerialNum
= xmlsecurity::bigIntegerToNumericString(xAuthor
->getSerialNumber());
674 std::vector
< SvtSecurityOptions::Certificate
> aTrustedAuthors
= SvtSecurityOptions::GetTrustedAuthors();
676 return std::any_of(aTrustedAuthors
.begin(), aTrustedAuthors
.end(),
677 [this, &xAuthor
, &sSerialNum
](const SvtSecurityOptions::Certificate
& rAuthor
) {
678 if (!xmlsecurity::EqualDistinguishedNames(rAuthor
.SubjectName
, xAuthor
->getIssuerName(), xmlsecurity::NOCOMPAT
))
680 if (rAuthor
.SerialNumber
!= sSerialNum
)
683 DocumentSignatureManager
aSignatureManager(mxCtx
, {});
684 if (!aSignatureManager
.init())
686 uno::Reference
<css::security::XCertificate
> xCert
= aSignatureManager
.getSecurityEnvironment()->createCertificateFromAscii(rAuthor
.RawData
);
688 auto pAuthor
= dynamic_cast<xmlsecurity::Certificate
*>(xAuthor
.get());
689 auto pCert
= dynamic_cast<xmlsecurity::Certificate
*>(xCert
.get());
690 if (pAuthor
&& pCert
)
691 return pCert
->getSHA256Thumbprint() == pAuthor
->getSHA256Thumbprint();
693 return xCert
->getSHA1Thumbprint() == xAuthor
->getSHA1Thumbprint();
697 uno::Sequence
<Reference
<css::security::XCertificate
>>
698 DocumentDigitalSignatures::chooseCertificatesImpl(std::map
<OUString
, OUString
>& rProperties
,
699 const UserAction eAction
,
700 const CertificateKind certificateKind
)
702 std::vector
< Reference
< css::xml::crypto::XXMLSecurityContext
> > xSecContexts
;
704 DocumentSignatureManager
aSignatureManager(mxCtx
, {});
705 if (aSignatureManager
.init()) {
706 xSecContexts
.push_back(aSignatureManager
.getSecurityContext());
707 // Don't include OpenPGP if only X.509 certs are requested
708 if (certificateKind
== CertificateKind_NONE
|| certificateKind
== CertificateKind_OPENPGP
)
709 xSecContexts
.push_back(aSignatureManager
.getGpgSecurityContext());
712 CertificateChooser
aChooser(Application::GetFrameWeld(mxParentWindow
), std::move(xSecContexts
), eAction
);
714 if (aChooser
.run() != RET_OK
)
715 return { Reference
< css::security::XCertificate
>(nullptr) };
717 uno::Sequence
< Reference
< css::security::XCertificate
> > xCerts
= aChooser
.GetSelectedCertificates();
718 rProperties
["Description"] = aChooser
.GetDescription();
719 rProperties
["Usage"] = aChooser
.GetUsageText();
724 Reference
< css::security::XCertificate
> DocumentDigitalSignatures::chooseCertificate(OUString
& rDescription
)
726 return chooseSigningCertificate( rDescription
);
729 Reference
< css::security::XCertificate
> DocumentDigitalSignatures::chooseSigningCertificate(OUString
& rDescription
)
731 std::map
<OUString
, OUString
> aProperties
;
732 Reference
< css::security::XCertificate
> xCert
= chooseCertificatesImpl( aProperties
, UserAction::Sign
)[0];
733 rDescription
= aProperties
["Description"];
737 Reference
< css::security::XCertificate
> DocumentDigitalSignatures::selectSigningCertificate(OUString
& rDescription
)
739 std::map
<OUString
, OUString
> aProperties
;
740 Reference
< css::security::XCertificate
> xCert
= chooseCertificatesImpl( aProperties
, UserAction::SelectSign
)[0];
741 rDescription
= aProperties
["Description"];
745 Reference
<css::security::XCertificate
>
746 DocumentDigitalSignatures::selectSigningCertificateWithType(const CertificateKind certificateKind
,
747 OUString
& rDescription
)
749 std::map
<OUString
, OUString
> aProperties
;
750 Reference
<css::security::XCertificate
> xCert
751 = chooseCertificatesImpl(aProperties
, UserAction::SelectSign
, certificateKind
)[0];
752 rDescription
= aProperties
["Description"];
756 css::uno::Sequence
< Reference
< css::security::XCertificate
> > DocumentDigitalSignatures::chooseEncryptionCertificate()
758 std::map
<OUString
, OUString
> aProperties
;
759 uno::Sequence
< Reference
< css::security::XCertificate
> > aCerts
=
760 chooseCertificatesImpl( aProperties
, UserAction::Encrypt
);
761 if (aCerts
.getLength() == 1 && !aCerts
[0].is())
762 // our error case contract is: empty sequence, so map that!
763 return uno::Sequence
< Reference
< css::security::XCertificate
> >();
768 css::uno::Reference
< css::security::XCertificate
> DocumentDigitalSignatures::chooseCertificateWithProps(Sequence
<::com::sun::star::beans::PropertyValue
>& rProperties
)
770 std::map
<OUString
, OUString
> aProperties
;
771 auto xCert
= chooseCertificatesImpl( aProperties
, UserAction::Sign
)[0];
773 std::vector
<css::beans::PropertyValue
> vec
;
774 vec
.reserve(aProperties
.size());
775 for (const auto& pair
: aProperties
)
777 vec
.emplace_back(comphelper::makePropertyValue(pair
.first
, pair
.second
));
780 rProperties
= comphelper::containerToSequence(vec
);
784 sal_Bool
DocumentDigitalSignatures::isLocationTrusted( const OUString
& Location
)
786 return SvtSecurityOptions::isTrustedLocationUri(Location
);
789 void DocumentDigitalSignatures::addAuthorToTrustedSources(
790 const Reference
< css::security::XCertificate
>& Author
)
792 SvtSecurityOptions::Certificate aNewCert
;
793 aNewCert
.SubjectName
= Author
->getIssuerName();
794 aNewCert
.SerialNumber
= xmlsecurity::bigIntegerToNumericString( Author
->getSerialNumber() );
796 OUStringBuffer aStrBuffer
;
797 ::comphelper::Base64::encode(aStrBuffer
, Author
->getEncoded());
798 aNewCert
.RawData
= aStrBuffer
.makeStringAndClear();
800 std::vector
< SvtSecurityOptions::Certificate
> aTrustedAuthors
= SvtSecurityOptions::GetTrustedAuthors();
801 aTrustedAuthors
.push_back( aNewCert
);
802 SvtSecurityOptions::SetTrustedAuthors( aTrustedAuthors
);
805 void DocumentDigitalSignatures::addLocationToTrustedSources( const OUString
& Location
)
807 std::vector
< OUString
> aSecURLs
= SvtSecurityOptions::GetSecureURLs();
808 aSecURLs
.push_back(Location
);
810 SvtSecurityOptions::SetSecureURLs( std::move(aSecURLs
) );
813 sal_Bool
DocumentDigitalSignatures::signDocumentWithCertificate(
814 css::uno::Reference
<css::security::XCertificate
> const & xCertificate
,
815 css::uno::Reference
<css::embed::XStorage
> const & xStorage
,
816 css::uno::Reference
<css::io::XStream
> const & xStream
)
818 uno::Reference
<frame::XModel
> xModel
;
819 return signWithCertificateImpl(xModel
, xCertificate
, xStorage
, xStream
,
820 DocumentSignatureMode::Content
);
823 bool DocumentDigitalSignatures::SignModelWithCertificate(
824 const uno::Reference
<frame::XModel
>& xModel
,
825 const css::uno::Reference
<css::security::XCertificate
>& xCertificate
,
826 const css::uno::Reference
<css::embed::XStorage
>& xStorage
,
827 const css::uno::Reference
<css::io::XStream
>& xStream
)
829 return signWithCertificateImpl(xModel
, xCertificate
, xStorage
, xStream
,
830 DocumentSignatureMode::Content
);
833 sal_Bool
DocumentDigitalSignatures::signPackageWithCertificate(
834 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
835 css::uno::Reference
<css::embed::XStorage
> const& xStorage
,
836 css::uno::Reference
<css::io::XStream
> const& xStream
)
838 uno::Reference
<frame::XModel
> xModel
;
839 return signWithCertificateImpl(xModel
, xCertificate
, xStorage
, xStream
,
840 DocumentSignatureMode::Package
);
843 sal_Bool
DocumentDigitalSignatures::signScriptingContentWithCertificate(
844 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
845 css::uno::Reference
<css::embed::XStorage
> const& xStorage
,
846 css::uno::Reference
<css::io::XStream
> const& xStream
)
848 uno::Reference
<frame::XModel
> xModel
;
849 return signWithCertificateImpl(xModel
, xCertificate
, xStorage
, xStream
,
850 DocumentSignatureMode::Macros
);
853 bool DocumentDigitalSignatures::signWithCertificateImpl(
854 const uno::Reference
<frame::XModel
>& xModel
,
855 css::uno::Reference
<css::security::XCertificate
> const& xCertificate
,
856 css::uno::Reference
<css::embed::XStorage
> const& xStorage
,
857 css::uno::Reference
<css::io::XStream
> const& xStream
, DocumentSignatureMode eMode
)
859 OSL_ENSURE(!m_sODFVersion
.isEmpty(),
860 "DocumentDigitalSignatures: ODF Version not set, assuming minimum 1.2");
862 DocumentSignatureManager
aSignatureManager(mxCtx
, eMode
);
864 if (!aSignatureManager
.init())
867 aSignatureManager
.setStore(xStorage
);
868 aSignatureManager
.getSignatureHelper().SetStorage(xStorage
, m_sODFVersion
);
869 aSignatureManager
.setSignatureStream(xStream
);
870 aSignatureManager
.setModel(xModel
);
872 Reference
<XXMLSecurityContext
> xSecurityContext
= aSignatureManager
.getSecurityContext();
874 sal_Int32 nSecurityId
;
876 bool bSuccess
= aSignatureManager
.add(xCertificate
, xSecurityContext
, "", nSecurityId
, true);
880 aSignatureManager
.read(/*bUseTempStream=*/true, /*bCacheLastSignature=*/false);
881 aSignatureManager
.write(true);
883 if (xStorage
.is() && !xStream
.is())
885 uno::Reference
<embed::XTransactedObject
> xTransaction(xStorage
, uno::UNO_QUERY
);
886 xTransaction
->commit();
892 extern "C" SAL_DLLPUBLIC_EXPORT
uno::XInterface
*
893 com_sun_star_security_DocumentDigitalSignatures_get_implementation(
894 uno::XComponentContext
* pCtx
, uno::Sequence
<uno::Any
> const& /*rSeq*/)
896 return cppu::acquire(
897 new DocumentDigitalSignatures(uno::Reference
<uno::XComponentContext
>(pCtx
)));
900 /* vim:set shiftwidth=4 softtabstop=4 expandtab: */