1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
3 * This file is part of the LibreOffice project.
5 * This Source Code Form is subject to the terms of the Mozilla Public
6 * License, v. 2.0. If a copy of the MPL was not distributed with this
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
9 * This file incorporates work covered by the following license notice:
11 * Licensed to the Apache Software Foundation (ASF) under one or more
12 * contributor license agreements. See the NOTICE file distributed
13 * with this work for additional information regarding copyright
14 * ownership. The ASF licenses this file to you under the Apache
15 * License, Version 2.0 (the "License"); you may not use this file
16 * except in compliance with the License. You may obtain a copy of
17 * the License at http://www.apache.org/licenses/LICENSE-2.0 .
25 #include <sal/config.h>
26 #include <sal/macros.h>
27 #include <osl/diagnose.h>
28 #include "securityenvironment_nssimpl.hxx"
29 #include <comphelper/servicehelper.hxx>
31 #include <xmlsec-wrapper.h>
33 #include <rtl/ustrbuf.hxx>
34 #include <comphelper/processfactory.hxx>
35 #include <comphelper/docpasswordrequest.hxx>
36 #include <sal/log.hxx>
37 #include <com/sun/star/task/InteractionHandler.hpp>
40 #include <osl/thread.h>
41 #include <comphelper/sequence.hxx>
43 #include "x509certificate_nssimpl.hxx"
44 #include "secerror.hxx"
48 // added for password exception
49 #include <com/sun/star/security/NoPasswordException.hpp>
50 #include <com/sun/star/security/CertificateCharacters.hpp>
51 #include <com/sun/star/security/CertificateValidity.hpp>
53 namespace csss
= ::com::sun::star::security
;
54 using namespace ::com::sun::star::security
;
55 using namespace com::sun::star
;
56 using namespace ::com::sun::star::uno
;
57 using namespace ::com::sun::star::lang
;
58 using ::com::sun::star::lang::XMultiServiceFactory
;
60 using ::com::sun::star::xml::crypto::XSecurityEnvironment
;
61 using ::com::sun::star::security::XCertificate
;
65 template <> struct default_delete
<PRArenaPool
>
67 void operator()(PRArenaPool
* ptr
) { PORT_FreeArena(ptr
, PR_FALSE
); }
71 static X509Certificate_NssImpl
* NssCertToXCert( CERTCertificate
* cert
) ;
72 static X509Certificate_NssImpl
* NssPrivKeyToXCert( SECKEYPrivateKey
* ) ;
75 struct UsageDescription
77 SECCertificateUsage usage
;
78 char const* description
;
81 : usage( certificateUsageCheckAllUsages
)
82 , description( nullptr )
85 UsageDescription( SECCertificateUsage i_usage
, char const* i_description
)
87 , description( i_description
)
92 static char* GetPasswordFunction( PK11SlotInfo
* pSlot
, PRBool bRetry
, void* /*arg*/ )
94 uno::Reference
< uno::XComponentContext
> xContext( ::comphelper::getProcessComponentContext() );
95 uno::Reference
< task::XInteractionHandler2
> xInteractionHandler(
96 task::InteractionHandler::createWithParent(xContext
, nullptr) );
98 task::PasswordRequestMode eMode
= bRetry
? task::PasswordRequestMode_PASSWORD_REENTER
: task::PasswordRequestMode_PASSWORD_ENTER
;
99 ::comphelper::DocPasswordRequest
* pPasswordRequest
= new ::comphelper::DocPasswordRequest(
100 ::comphelper::DocPasswordRequestType::Standard
, eMode
, OUString::createFromAscii(PK11_GetTokenName(pSlot
)) );
102 uno::Reference
< task::XInteractionRequest
> xRequest( pPasswordRequest
);
103 xInteractionHandler
->handle( xRequest
);
105 if ( pPasswordRequest
->isPassword() )
107 OString
aPassword(OUStringToOString(
108 pPasswordRequest
->getPassword(),
109 osl_getThreadTextEncoding()));
110 sal_Int32 nLen
= aPassword
.getLength();
111 char* pPassword
= static_cast<char*>(PORT_Alloc( nLen
+1 ) );
113 memcpy( pPassword
, aPassword
.getStr(), nLen
);
119 SecurityEnvironment_NssImpl::SecurityEnvironment_NssImpl() :
120 m_pHandler( nullptr ) , m_tSymKeyList() {
121 PK11_SetPasswordFunc( GetPasswordFunction
) ;
124 SecurityEnvironment_NssImpl::~SecurityEnvironment_NssImpl() {
126 PK11_SetPasswordFunc( nullptr ) ;
128 for (auto& slot
: m_Slots
)
133 for( auto& symKey
: m_tSymKeyList
)
134 PK11_FreeSymKey( symKey
) ;
138 OUString SAL_CALL
SecurityEnvironment_NssImpl::getImplementationName() {
139 return "com.sun.star.xml.crypto.SecurityEnvironment";
143 sal_Bool SAL_CALL
SecurityEnvironment_NssImpl::supportsService( const OUString
& serviceName
) {
144 Sequence
< OUString
> seqServiceNames
= getSupportedServiceNames() ;
145 return comphelper::findValue(seqServiceNames
, serviceName
) != -1;
149 Sequence
< OUString
> SAL_CALL
SecurityEnvironment_NssImpl::getSupportedServiceNames() {
150 Sequence
<OUString
> seqServiceNames
{ "com.sun.star.xml.crypto.SecurityEnvironment" };
151 return seqServiceNames
;
155 sal_Int64 SAL_CALL
SecurityEnvironment_NssImpl::getSomething( const Sequence
< sal_Int8
>& aIdentifier
)
157 if( isUnoTunnelId
<SecurityEnvironment_NssImpl
>(aIdentifier
) ) {
158 return sal::static_int_cast
<sal_Int64
>(reinterpret_cast<sal_uIntPtr
>(this));
163 /* XUnoTunnel extension */
167 class theSecurityEnvironment_NssImplUnoTunnelId
: public rtl::Static
< UnoTunnelIdInit
, theSecurityEnvironment_NssImplUnoTunnelId
> {};
170 const Sequence
< sal_Int8
>& SecurityEnvironment_NssImpl::getUnoTunnelId() {
171 return theSecurityEnvironment_NssImplUnoTunnelId::get().getSeq();
174 OUString
SecurityEnvironment_NssImpl::getSecurityEnvironmentInformation()
177 for (auto& slot
: m_Slots
)
179 buff
.append(OUString::createFromAscii(PK11_GetTokenName(slot
)));
182 return buff
.makeStringAndClear();
185 void SecurityEnvironment_NssImpl::addCryptoSlot( PK11SlotInfo
* aSlot
)
187 PK11_ReferenceSlot(aSlot
);
188 m_Slots
.push_back(aSlot
);
191 //Could we have multiple cert dbs?
192 void SecurityEnvironment_NssImpl::setCertDb( CERTCertDBHandle
* aCertDb
) {
193 m_pHandler
= aCertDb
;
196 void SecurityEnvironment_NssImpl::adoptSymKey( PK11SymKey
* aSymKey
) {
197 if( aSymKey
!= nullptr ) {
198 //First try to find the key in the list
199 if (std::find(m_tSymKeyList
.begin(), m_tSymKeyList
.end(), aSymKey
) != m_tSymKeyList
.end())
202 //If we do not find the key in the list, add a new node
203 PK11SymKey
* symkey
= PK11_ReferenceSymKey( aSymKey
) ;
204 if( symkey
== nullptr )
205 throw RuntimeException() ;
208 m_tSymKeyList
.push_back( symkey
) ;
209 } catch ( Exception
& ) {
210 PK11_FreeSymKey( symkey
) ;
215 void SecurityEnvironment_NssImpl::updateSlots()
217 //In case new tokens are present then we can obtain the corresponding slot
218 osl::MutexGuard
guard(m_mutex
);
221 m_tSymKeyList
.clear();
223 PK11SlotList
* soltList
= PK11_GetAllTokens( CKM_INVALID_MECHANISM
, PR_FALSE
, PR_FALSE
, nullptr ) ;
224 if( soltList
!= nullptr )
226 for (PK11SlotListElement
* soltEle
= soltList
->head
; soltEle
!= nullptr; soltEle
= soltEle
->next
)
228 PK11SlotInfo
* pSlot
= soltEle
->slot
;
233 "xmlsecurity.xmlsec",
234 "Found a slot: SlotName=" << PK11_GetSlotName(pSlot
)
235 << ", TokenName=" << PK11_GetTokenName(pSlot
));
237 //The following code which is commented out checks if a slot, that is a smart card for example, is
238 // able to generate a symmetric key of type CKM_DES3_CBC. If this fails then this token
239 // will not be used. This key is possibly used for the encryption service. However, all
240 // interfaces and services used for public key signature and encryption are not published
241 // and the encryption is not used in OOo. Therefore it does not do any harm to remove
242 // this code, hence allowing smart cards which cannot generate this type of key.
244 // By doing this, the encryption may fail if a smart card is being used which does not
245 // support this key generation.
247 PK11SymKey
* pSymKey
= PK11_KeyGen( pSlot
, CKM_DES3_CBC
, nullptr, 128, nullptr ) ;
248 // if( pSymKey == NULL )
250 // PK11_FreeSlot( pSlot ) ;
251 // SAL_INFO( "xmlsecurity", "XMLSEC: Error - pSymKey is NULL" );
254 addCryptoSlot(pSlot
);
255 PK11_FreeSlot( pSlot
) ;
258 if (pSymKey
!= nullptr)
260 adoptSymKey( pSymKey
) ;
261 PK11_FreeSymKey( pSymKey
) ;
265 }// end of if(pSlot != NULL)
267 }// end of if( soltList != NULL )
270 Sequence
< Reference
< XCertificate
> >
271 SecurityEnvironment_NssImpl::getPersonalCertificates()
274 X509Certificate_NssImpl
* xcert
;
275 std::vector
< X509Certificate_NssImpl
* > certsList
;
278 //firstly, we try to find private keys in slot
279 for (auto& slot
: m_Slots
)
281 SECKEYPrivateKeyList
* priKeyList
;
283 if( PK11_NeedLogin(slot
) ) {
284 SECStatus nRet
= PK11_Authenticate(slot
, PR_TRUE
, nullptr);
285 //PK11_Authenticate may fail in case the a slot has not been initialized.
286 //this is the case if the user has a new profile, so that they have never
287 //added a personal certificate.
288 if( nRet
!= SECSuccess
&& PORT_GetError() != SEC_ERROR_IO
) {
289 throw NoPasswordException();
293 priKeyList
= PK11_ListPrivateKeysInSlot(slot
) ;
294 if( priKeyList
!= nullptr )
296 for (SECKEYPrivateKeyListNode
* curPri
= PRIVKEY_LIST_HEAD(priKeyList
);
297 !PRIVKEY_LIST_END( curPri
, priKeyList
) && curPri
!= nullptr;
298 curPri
= PRIVKEY_LIST_NEXT(curPri
))
300 xcert
= NssPrivKeyToXCert( curPri
->key
) ;
301 if( xcert
!= nullptr )
302 certsList
.push_back( xcert
) ;
304 SECKEY_DestroyPrivateKeyList( priKeyList
) ;
310 length
= certsList
.size() ;
313 Sequence
< Reference
< XCertificate
> > certSeq( length
) ;
315 for( const auto& rXCert
: certsList
) {
316 certSeq
[i
] = rXCert
;
323 return Sequence
< Reference
< XCertificate
> > ();
326 Reference
< XCertificate
> SecurityEnvironment_NssImpl::getCertificate( const OUString
& issuerName
, const Sequence
< sal_Int8
>& serialNumber
)
328 X509Certificate_NssImpl
* xcert
= nullptr;
330 if( m_pHandler
!= nullptr ) {
331 CERTIssuerAndSN issuerAndSN
;
332 CERTCertificate
* cert
;
336 std::unique_ptr
<PRArenaPool
> arena(PORT_NewArena(DER_DEFAULT_CHUNKSIZE
));
337 if( arena
== nullptr )
338 throw RuntimeException() ;
340 // Create cert info from issue and serial
341 OString ostr
= OUStringToOString( issuerName
, RTL_TEXTENCODING_UTF8
) ;
342 chIssuer
= PL_strndup( ostr
.getStr(), static_cast<int>(ostr
.getLength()) ) ;
343 nmIssuer
= CERT_AsciiToName( chIssuer
) ;
344 if( nmIssuer
== nullptr ) {
345 PL_strfree( chIssuer
) ;
346 return nullptr; // no need for exception cf. i40394
349 derIssuer
= SEC_ASN1EncodeItem( arena
.get(), nullptr, static_cast<void*>(nmIssuer
), SEC_ASN1_GET( CERT_NameTemplate
) ) ;
350 if( derIssuer
== nullptr ) {
351 PL_strfree( chIssuer
) ;
352 CERT_DestroyName( nmIssuer
) ;
353 throw RuntimeException() ;
356 memset( &issuerAndSN
, 0, sizeof( issuerAndSN
) ) ;
358 issuerAndSN
.derIssuer
.data
= derIssuer
->data
;
359 issuerAndSN
.derIssuer
.len
= derIssuer
->len
;
361 issuerAndSN
.serialNumber
.data
= reinterpret_cast<unsigned char *>(const_cast<sal_Int8
*>(serialNumber
.getConstArray()));
362 issuerAndSN
.serialNumber
.len
= serialNumber
.getLength() ;
364 cert
= CERT_FindCertByIssuerAndSN( m_pHandler
, &issuerAndSN
) ;
365 if( cert
!= nullptr ) {
366 xcert
= NssCertToXCert( cert
) ;
371 PL_strfree( chIssuer
) ;
372 CERT_DestroyName( nmIssuer
) ;
373 //SECITEM_FreeItem( derIssuer, PR_FALSE ) ;
374 CERT_DestroyCertificate( cert
) ;
382 Sequence
< Reference
< XCertificate
> > SecurityEnvironment_NssImpl::buildCertificatePath( const Reference
< XCertificate
>& begin
) {
383 // Remember the signing certificate.
384 m_xSigningCertificate
= begin
;
386 const X509Certificate_NssImpl
* xcert
;
387 const CERTCertificate
* cert
;
388 CERTCertList
* certChain
;
390 Reference
< XUnoTunnel
> xCertTunnel( begin
, UNO_QUERY_THROW
) ;
391 xcert
= reinterpret_cast<X509Certificate_NssImpl
*>(
392 sal::static_int_cast
<sal_uIntPtr
>(xCertTunnel
->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
393 if( xcert
== nullptr ) {
394 throw RuntimeException() ;
397 cert
= xcert
->getNssCert() ;
398 if( cert
!= nullptr ) {
401 //Get the system clock time
402 timeboundary
= PR_Now() ;
404 certChain
= CERT_GetCertChainFromCert( const_cast<CERTCertificate
*>(cert
), timeboundary
, certUsageAnyCA
) ;
406 certChain
= nullptr ;
409 if( certChain
!= nullptr ) {
410 std::vector
<uno::Reference
<security::XCertificate
>> aCertChain
;
412 for (CERTCertListNode
* node
= CERT_LIST_HEAD(certChain
); !CERT_LIST_END(node
, certChain
); node
= CERT_LIST_NEXT(node
)) {
413 X509Certificate_NssImpl
* pCert
= new X509Certificate_NssImpl();
414 if( pCert
== nullptr ) {
415 CERT_DestroyCertList( certChain
) ;
416 throw RuntimeException() ;
419 pCert
->setCert( node
->cert
) ;
421 aCertChain
.push_back(pCert
);
424 CERT_DestroyCertList( certChain
) ;
426 return comphelper::containerToSequence(aCertChain
);
429 return Sequence
< Reference
< XCertificate
> >();
432 X509Certificate_NssImpl
* SecurityEnvironment_NssImpl::createAndAddCertificateFromPackage(
433 const css::uno::Sequence
<sal_Int8
>& raDERCertificate
,
434 OUString
const & raString
)
436 auto pCertificateBytes
= reinterpret_cast<char *>(const_cast<sal_Int8
*>(raDERCertificate
.getConstArray()));
437 CERTCertificate
* pCERTCertificate
= CERT_DecodeCertFromPackage(pCertificateBytes
, raDERCertificate
.getLength());
439 if (!pCERTCertificate
)
444 OString aTrustString
= OUStringToOString(raString
, RTL_TEXTENCODING_ASCII_US
);
445 CERTCertTrust aTrust
;
447 aStatus
= CERT_DecodeTrustString(&aTrust
, aTrustString
.getStr());
449 if (aStatus
!= SECSuccess
)
452 PK11SlotInfo
* pSlot
= PK11_GetInternalKeySlot();
457 aStatus
= PK11_ImportCert(pSlot
, pCERTCertificate
, CK_INVALID_HANDLE
, nullptr, PR_FALSE
);
459 if (aStatus
!= SECSuccess
)
462 aStatus
= CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), pCERTCertificate
, &aTrust
);
464 if (aStatus
!= SECSuccess
)
468 PK11_FreeSlot(pSlot
);
470 X509Certificate_NssImpl
* pX509Certificate
= new X509Certificate_NssImpl();
471 pX509Certificate
->setCert(pCERTCertificate
);
472 return pX509Certificate
;
475 X509Certificate_NssImpl
* SecurityEnvironment_NssImpl::createX509CertificateFromDER(const css::uno::Sequence
<sal_Int8
>& aDerCertificate
)
477 X509Certificate_NssImpl
* pX509Certificate
= nullptr;
479 if (aDerCertificate
.hasElements())
481 pX509Certificate
= new X509Certificate_NssImpl();
482 if (pX509Certificate
== nullptr)
483 throw RuntimeException();
484 pX509Certificate
->setRawCert(aDerCertificate
);
486 return pX509Certificate
;
489 Reference
<XCertificate
> SecurityEnvironment_NssImpl::createCertificateFromRaw(const Sequence
< sal_Int8
>& rawCertificate
)
491 return createX509CertificateFromDER(rawCertificate
);
494 Reference
< XCertificate
> SecurityEnvironment_NssImpl::createCertificateFromAscii( const OUString
& asciiCertificate
)
496 OString oscert
= OUStringToOString( asciiCertificate
, RTL_TEXTENCODING_ASCII_US
) ;
497 xmlChar
* chCert
= xmlStrndup( reinterpret_cast<const xmlChar
*>(oscert
.getStr()), static_cast<int>(oscert
.getLength()) ) ;
498 int certSize
= xmlSecBase64Decode( chCert
, reinterpret_cast<xmlSecByte
*>(chCert
), xmlStrlen( chCert
) ) ;
501 Sequence
< sal_Int8
> rawCert(certSize
) ;
502 for (int i
= 0 ; i
< certSize
; ++i
)
503 rawCert
[i
] = *( chCert
+ i
) ;
507 return createCertificateFromRaw( rawCert
) ;
515 sal_Int32
SecurityEnvironment_NssImpl ::
516 verifyCertificate( const Reference
< csss::XCertificate
>& aCert
,
517 const Sequence
< Reference
< csss::XCertificate
> >& intermediateCerts
)
519 sal_Int32 validity
= csss::CertificateValidity::INVALID
;
520 const X509Certificate_NssImpl
* xcert
;
521 const CERTCertificate
* cert
;
522 ::std::vector
<CERTCertificate
*> vecTmpNSSCertificates
;
523 Reference
< XUnoTunnel
> xCertTunnel( aCert
, UNO_QUERY_THROW
) ;
525 SAL_INFO("xmlsecurity.xmlsec", "Start verification of certificate: " << aCert
->getSubjectName());
527 xcert
= reinterpret_cast<X509Certificate_NssImpl
*>(
528 sal::static_int_cast
<sal_uIntPtr
>(xCertTunnel
->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
529 if( xcert
== nullptr ) {
530 throw RuntimeException() ;
533 //CERT_PKIXVerifyCert does not take a db as argument. It will therefore
534 //internally use CERT_GetDefaultCertDB
535 //Make sure m_pHandler is the default DB
536 OSL_ASSERT(m_pHandler
== CERT_GetDefaultCertDB());
537 CERTCertDBHandle
* certDb
= m_pHandler
!= nullptr ? m_pHandler
: CERT_GetDefaultCertDB();
538 cert
= xcert
->getNssCert() ;
539 if( cert
!= nullptr )
542 //prepare the intermediate certificates
543 for (const auto& rIntermediateCert
: intermediateCerts
)
545 Sequence
<sal_Int8
> der
= rIntermediateCert
->getEncoded();
547 item
.type
= siBuffer
;
548 item
.data
= reinterpret_cast<unsigned char*>(der
.getArray());
549 item
.len
= der
.getLength();
551 CERTCertificate
* certTmp
= CERT_NewTempCertificate(certDb
, &item
,
552 nullptr /* nickname */,
553 PR_FALSE
/* isPerm */,
554 PR_TRUE
/* copyDER */);
557 SAL_INFO("xmlsecurity.xmlsec", "Failed to add a temporary certificate: " << rIntermediateCert
->getIssuerName());
562 SAL_INFO("xmlsecurity.xmlsec", "Added temporary certificate: " <<
563 (certTmp
->subjectName
? certTmp
->subjectName
: ""));
564 vecTmpNSSCertificates
.push_back(certTmp
);
572 log
.arena
= PORT_NewArena(512);
573 log
.head
= log
.tail
= nullptr;
576 CERT_EnableOCSPChecking(certDb
);
577 CERT_DisableOCSPDefaultResponder(certDb
);
578 CERTValOutParam cvout
[5];
579 CERTValInParam cvin
[3];
582 #if ( NSS_VMAJOR > 3 ) || ( NSS_VMAJOR == 3 && NSS_VMINOR > 12 ) || ( NSS_VMAJOR == 3 && NSS_VMINOR == 12 && NSS_VPATCH > 0 )
583 cvin
[ncvinCount
].type
= cert_pi_useAIACertFetch
;
584 cvin
[ncvinCount
].value
.scalar
.b
= PR_TRUE
;
588 PRUint64 revFlagsLeaf
[2];
589 PRUint64 revFlagsChain
[2];
590 CERTRevocationFlags rev
;
591 rev
.leafTests
.number_of_defined_methods
= 2;
592 rev
.leafTests
.cert_rev_flags_per_method
= revFlagsLeaf
;
593 //the flags are defined in cert.h
594 //We check both leaf and chain.
595 //It is enough if one revocation method has fresh info,
596 //but at least one must have some. Otherwise validation fails.
597 //!!! using leaf test and CERT_REV_MI_REQUIRE_SOME_FRESH_INFO_AVAILABLE
598 // when validating a root certificate will result in "revoked". Usually
599 //there is no revocation information available for the root cert because
600 //it must be trusted anyway and it does itself issue revocation information.
601 //When we use the flag here and OOo shows the certification path then the root
602 //cert is invalid while all other can be valid. It would probably best if
603 //this interface method returned the whole chain.
604 //Otherwise we need to check if the certificate is self-signed and if it is
605 //then not use the flag when doing the leaf-test.
606 rev
.leafTests
.cert_rev_flags_per_method
[cert_revocation_method_crl
] =
607 CERT_REV_M_TEST_USING_THIS_METHOD
608 | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE
;
609 rev
.leafTests
.cert_rev_flags_per_method
[cert_revocation_method_ocsp
] =
610 CERT_REV_M_TEST_USING_THIS_METHOD
611 | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE
;
612 rev
.leafTests
.number_of_preferred_methods
= 0;
613 rev
.leafTests
.preferred_methods
= nullptr;
614 rev
.leafTests
.cert_rev_method_independent_flags
=
615 CERT_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST
;
617 rev
.chainTests
.number_of_defined_methods
= 2;
618 rev
.chainTests
.cert_rev_flags_per_method
= revFlagsChain
;
619 rev
.chainTests
.cert_rev_flags_per_method
[cert_revocation_method_crl
] =
620 CERT_REV_M_TEST_USING_THIS_METHOD
621 | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE
;
622 rev
.chainTests
.cert_rev_flags_per_method
[cert_revocation_method_ocsp
] =
623 CERT_REV_M_TEST_USING_THIS_METHOD
624 | CERT_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE
;
625 rev
.chainTests
.number_of_preferred_methods
= 0;
626 rev
.chainTests
.preferred_methods
= nullptr;
627 rev
.chainTests
.cert_rev_method_independent_flags
=
628 CERT_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST
;
631 cvin
[ncvinCount
].type
= cert_pi_revocationFlags
;
632 cvin
[ncvinCount
].value
.pointer
.revocation
= &rev
;
634 // does not work, not implemented yet in 3.12.4
635 // cvin[ncvinCount].type = cert_pi_keyusage;
636 // cvin[ncvinCount].value.scalar.ui = KU_DIGITAL_SIGNATURE;
638 cvin
[ncvinCount
].type
= cert_pi_end
;
640 cvout
[0].type
= cert_po_trustAnchor
;
641 cvout
[0].value
.pointer
.cert
= nullptr;
642 cvout
[1].type
= cert_po_errorLog
;
643 cvout
[1].value
.pointer
.log
= &log
;
644 cvout
[2].type
= cert_po_end
;
646 // We check SSL server certificates, CA certificates and signing certificates.
648 // ToDo check keyusage, looking at CERT_KeyUsageAndTypeForCertUsage (
649 // mozilla/security/nss/lib/certdb/certdb.c indicates that
650 // certificateUsageSSLClient, certificateUsageSSLServer and certificateUsageSSLCA
651 // are sufficient. They cover the key usages for digital signature, key agreement
652 // and encipherment and certificate signature
654 //never use the following usages because they are not checked properly
655 // certificateUsageUserCertImport
656 // certificateUsageVerifyCA
657 // certificateUsageAnyCA
658 // certificateUsageProtectedObjectSigner
660 UsageDescription arUsages
[5];
661 arUsages
[0] = UsageDescription( certificateUsageSSLClient
, "certificateUsageSSLClient" );
662 arUsages
[1] = UsageDescription( certificateUsageSSLServer
, "certificateUsageSSLServer" );
663 arUsages
[2] = UsageDescription( certificateUsageSSLCA
, "certificateUsageSSLCA" );
664 arUsages
[3] = UsageDescription( certificateUsageEmailSigner
, "certificateUsageEmailSigner" );
665 arUsages
[4] = UsageDescription( certificateUsageEmailRecipient
, "certificateUsageEmailRecipient" );
667 int numUsages
= SAL_N_ELEMENTS(arUsages
);
668 for (int i
= 0; i
< numUsages
; i
++)
670 SAL_INFO("xmlsecurity.xmlsec", "Testing usage " << i
+1 <<
671 " of " << numUsages
<< ": " <<
672 arUsages
[i
].description
<<
673 " (0x" << std::hex
<< static_cast<int>(arUsages
[i
].usage
) << ")" << std::dec
);
675 status
= CERT_PKIXVerifyCert(const_cast<CERTCertificate
*>(cert
), arUsages
[i
].usage
,
676 cvin
, cvout
, nullptr);
677 if( status
== SECSuccess
)
679 SAL_INFO("xmlsecurity.xmlsec", "CERT_PKIXVerifyCert returned SECSuccess.");
680 //When an intermediate or root certificate is checked then we expect the usage
681 //certificateUsageSSLCA. This, however, will be only set when in the trust settings dialog
682 //the button "This certificate can identify websites" is checked. If for example only
683 //"This certificate can identify mail users" is set then the end certificate can
684 //be validated and the returned usage will contain certificateUsageEmailRecipient.
685 //But checking directly the root or intermediate certificate will fail. In the
686 //certificate path view the end certificate will be shown as valid but the others
687 //will be displayed as invalid.
689 validity
= csss::CertificateValidity::VALID
;
690 SAL_INFO("xmlsecurity.xmlsec", "Certificate is valid.");
691 CERTCertificate
* issuerCert
= cvout
[0].value
.pointer
.cert
;
694 SAL_INFO("xmlsecurity.xmlsec", "Root certificate: " << issuerCert
->subjectName
);
695 CERT_DestroyCertificate(issuerCert
);
702 PRIntn err
= PR_GetError();
703 SAL_INFO("xmlsecurity.xmlsec", "Error: " << err
<< ": " << getCertError(err
));
705 /* Display validation results */
708 CERTVerifyLogNode
*node
= nullptr;
709 printChainFailure(&log
);
711 for (node
= log
.head
; node
; node
= node
->next
) {
713 CERT_DestroyCertificate(node
->cert
);
715 log
.head
= log
.tail
= nullptr;
718 SAL_INFO("xmlsecurity.xmlsec", "Certificate is invalid.");
725 validity
= css::security::CertificateValidity::INVALID
;
728 //Destroying the temporary certificates
729 for (auto& tmpCert
: vecTmpNSSCertificates
)
731 SAL_INFO("xmlsecurity.xmlsec", "Destroying temporary certificate");
732 CERT_DestroyCertificate(tmpCert
);
737 sal_Int32
SecurityEnvironment_NssImpl::getCertificateCharacters(
738 const css::uno::Reference
< css::security::XCertificate
>& aCert
) {
739 sal_Int32 characters
;
740 const X509Certificate_NssImpl
* xcert
;
741 const CERTCertificate
* cert
;
743 Reference
< XUnoTunnel
> xCertTunnel( aCert
, UNO_QUERY_THROW
) ;
744 xcert
= reinterpret_cast<X509Certificate_NssImpl
*>(
745 sal::static_int_cast
<sal_uIntPtr
>(xCertTunnel
->getSomething( X509Certificate_NssImpl::getUnoTunnelId() ))) ;
746 if( xcert
== nullptr ) {
747 throw RuntimeException() ;
750 cert
= xcert
->getNssCert() ;
752 characters
= 0x00000000 ;
754 //Firstly, find out whether or not the cert is self-signed.
755 if( SECITEM_CompareItem( &(cert
->derIssuer
), &(cert
->derSubject
) ) == SECEqual
) {
756 characters
|= css::security::CertificateCharacters::SELF_SIGNED
;
758 characters
&= ~ css::security::CertificateCharacters::SELF_SIGNED
;
761 //Secondly, find out whether or not the cert has a private key.
766 * mmi : need to check whether the cert's slot is valid first
768 SECKEYPrivateKey
* priKey
= nullptr;
770 if (cert
->slot
!= nullptr)
772 priKey
= PK11_FindPrivateKeyFromCert( cert
->slot
, const_cast<CERTCertificate
*>(cert
), nullptr ) ;
774 if(priKey
== nullptr)
776 for (auto& slot
: m_Slots
)
778 priKey
= PK11_FindPrivateKeyFromCert(slot
, const_cast<CERTCertificate
*>(cert
), nullptr);
783 if( priKey
!= nullptr ) {
784 characters
|= css::security::CertificateCharacters::HAS_PRIVATE_KEY
;
786 SECKEY_DestroyPrivateKey( priKey
) ;
788 characters
&= ~ css::security::CertificateCharacters::HAS_PRIVATE_KEY
;
794 X509Certificate_NssImpl
* NssCertToXCert( CERTCertificate
* cert
)
796 X509Certificate_NssImpl
* xcert
;
798 if( cert
!= nullptr ) {
799 xcert
= new X509Certificate_NssImpl() ;
800 xcert
->setCert( cert
) ;
808 X509Certificate_NssImpl
* NssPrivKeyToXCert( SECKEYPrivateKey
* priKey
)
810 X509Certificate_NssImpl
* xcert
;
812 if( priKey
!= nullptr ) {
813 CERTCertificate
* cert
= PK11_GetCertFromPrivateKey( priKey
) ;
815 if( cert
!= nullptr ) {
816 xcert
= NssCertToXCert( cert
) ;
821 CERT_DestroyCertificate( cert
) ;
829 xmlSecKeysMngrPtr
SecurityEnvironment_NssImpl::createKeysManager() {
832 * The following lines is based on the private version of xmlSec-NSS
835 int cSlots
= m_Slots
.size();
836 std::unique_ptr
<PK11SlotInfo
*[]> sarSlots(new PK11SlotInfo
*[cSlots
]);
837 PK11SlotInfo
** slots
= sarSlots
.get();
839 for (const auto& slot
: m_Slots
)
845 xmlSecKeysMngrPtr pKeysMngr
= xmlSecKeysMngrCreate();
847 throw RuntimeException();
849 if (xmlSecNssAppDefaultKeysMngrInit(pKeysMngr
) < 0)
850 throw RuntimeException();
852 // Adopt the private key of the signing certificate, if it has any.
853 if (auto pCertificate
= dynamic_cast<X509Certificate_NssImpl
*>(m_xSigningCertificate
.get()))
855 SECKEYPrivateKey
* pPrivateKey
= SECKEY_CopyPrivateKey(pCertificate
->getPrivateKey());
858 xmlSecKeyDataPtr pKeyData
= xmlSecNssPKIAdoptKey(pPrivateKey
, nullptr);
859 xmlSecKeyPtr pKey
= xmlSecKeyCreate();
860 xmlSecKeySetValue(pKey
, pKeyData
);
861 xmlSecNssAppDefaultKeysMngrAdoptKey(pKeysMngr
, pKey
);
865 SAL_WARN("xmlsecurity.xmlsec", "Can't get the private key from the certificate.");
872 void SecurityEnvironment_NssImpl::destroyKeysManager(xmlSecKeysMngrPtr pKeysMngr
) {
873 if( pKeysMngr
!= nullptr ) {
874 xmlSecKeysMngrDestroy( pKeysMngr
) ;
878 SECKEYPrivateKey
* SecurityEnvironment_NssImpl::insertPrivateKey(css::uno::Sequence
<sal_Int8
> const & raPrivateKey
)
880 PK11SlotInfo
* pSlot
= PK11_GetInternalKeySlot();
885 SECItem aDerPrivateKeyInfo
;
886 aDerPrivateKeyInfo
.data
= reinterpret_cast<unsigned char *>(const_cast<sal_Int8
*>(raPrivateKey
.getConstArray()));
887 aDerPrivateKeyInfo
.len
= raPrivateKey
.getLength();
889 const unsigned int aKeyUsage
= KU_ALL
;
890 SECKEYPrivateKey
* pPrivateKey
= nullptr;
892 bool bPermanent
= PR_FALSE
;
893 bool bPrivate
= PR_TRUE
;
895 SECStatus nStatus
= PK11_ImportDERPrivateKeyInfoAndReturnKey(
896 pSlot
, &aDerPrivateKeyInfo
, nullptr, nullptr, bPermanent
, bPrivate
,
897 aKeyUsage
, &pPrivateKey
, nullptr);
899 if (nStatus
!= SECSuccess
)
902 PK11_FreeSlot(pSlot
);
907 uno::Reference
<security::XCertificate
> SecurityEnvironment_NssImpl::createDERCertificateWithPrivateKey(
908 Sequence
<sal_Int8
> const & raDERCertificate
, Sequence
<sal_Int8
> const & raPrivateKey
)
910 SECKEYPrivateKey
* pPrivateKey
= insertPrivateKey(raPrivateKey
);
913 return uno::Reference
<security::XCertificate
>();
915 X509Certificate_NssImpl
* pX509Certificate
= createAndAddCertificateFromPackage(raDERCertificate
, "TCu,TCu,TCu");
916 if (!pX509Certificate
)
917 return uno::Reference
<security::XCertificate
>();
919 return pX509Certificate
;
922 uno::Reference
<security::XCertificate
> SecurityEnvironment_NssImpl::addDERCertificateToTheDatabase(
923 uno::Sequence
<sal_Int8
> const & raDERCertificate
, OUString
const & raTrustString
)
925 X509Certificate_NssImpl
* pX509Certificate
= createAndAddCertificateFromPackage(raDERCertificate
, raTrustString
);
926 return pX509Certificate
;
929 extern "C" SAL_DLLPUBLIC_EXPORT
uno::XInterface
*
930 com_sun_star_xml_crypto_SecurityEnvironment_get_implementation(
931 uno::XComponentContext
* /*pCtx*/, uno::Sequence
<uno::Any
> const& /*rSeq*/)
933 return cppu::acquire(new SecurityEnvironment_NssImpl
);
936 /* vim:set shiftwidth=4 softtabstop=4 expandtab: */