forked from amazingfate/loongoffice
...(for now, from LIBO_INTERNAL_CODE only). See the mail thread starting at <https://lists.freedesktop.org/archives/libreoffice/2017-January/076665.html> "Dynamic Exception Specifications" for details. Most changes have been done automatically by the rewriting loplugin:dynexcspec (after enabling the rewriting mode, to be committed shortly). The way it only removes exception specs from declarations if it also sees a definition, it identified some dead declarations-w/o-definitions (that have been removed manually) and some cases where a definition appeared in multiple include files (which have also been cleaned up manually). There's also been cases of macro paramters (that were used to abstract over exception specs) that have become unused now (and been removed). Furthermore, some code needed to be cleaned up manually (avmedia/source/quicktime/ and connectivity/source/drivers/kab/), as I had no configurations available that would actually build that code. Missing @throws documentation has not been applied in such manual clean-up. Change-Id: I3408691256c9b0c12bc5332de976743626e13960 Reviewed-on: https://gerrit.libreoffice.org/33574 Tested-by: Jenkins <ci@libreoffice.org> Reviewed-by: Stephan Bergmann <sbergman@redhat.com>
365 lines
12 KiB
C++
365 lines
12 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
/*
|
|
* This file is part of the LibreOffice project.
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
* This file incorporates work covered by the following license notice:
|
|
*
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed
|
|
* with this work for additional information regarding copyright
|
|
* ownership. The ASF licenses this file to you under the Apache
|
|
* License, Version 2.0 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
|
|
*/
|
|
|
|
#include <sal/config.h>
|
|
#include <rtl/uuid.h>
|
|
#include "xmlencryption_mscryptimpl.hxx"
|
|
|
|
#include "xmlsec/xmldocumentwrapper_xmlsecimpl.hxx"
|
|
|
|
#include "xmlelementwrapper_xmlsecimpl.hxx"
|
|
|
|
#include "securityenvironment_mscryptimpl.hxx"
|
|
#include "errorcallback.hxx"
|
|
|
|
#include "xmlsec-wrapper.h"
|
|
|
|
#ifdef UNX
|
|
#define stricmp strcasecmp
|
|
#endif
|
|
|
|
using namespace ::com::sun::star::uno ;
|
|
using namespace ::com::sun::star::lang ;
|
|
using ::com::sun::star::lang::XMultiServiceFactory ;
|
|
using ::com::sun::star::lang::XSingleServiceFactory ;
|
|
|
|
using ::com::sun::star::xml::wrapper::XXMLElementWrapper ;
|
|
using ::com::sun::star::xml::wrapper::XXMLDocumentWrapper ;
|
|
using ::com::sun::star::xml::crypto::XSecurityEnvironment ;
|
|
using ::com::sun::star::xml::crypto::XXMLEncryption ;
|
|
using ::com::sun::star::xml::crypto::XXMLEncryptionTemplate ;
|
|
using ::com::sun::star::xml::crypto::XXMLSecurityContext ;
|
|
using ::com::sun::star::xml::crypto::XMLEncryptionException ;
|
|
|
|
XMLEncryption_MSCryptImpl::XMLEncryption_MSCryptImpl( const Reference< XMultiServiceFactory >& aFactory ) : m_xServiceManager( aFactory ) {
|
|
}
|
|
|
|
XMLEncryption_MSCryptImpl::~XMLEncryption_MSCryptImpl() {
|
|
}
|
|
|
|
/* XXMLEncryption */
|
|
Reference< XXMLEncryptionTemplate >
|
|
SAL_CALL XMLEncryption_MSCryptImpl::encrypt(
|
|
const Reference< XXMLEncryptionTemplate >& aTemplate ,
|
|
const Reference< XSecurityEnvironment >& aEnvironment
|
|
)
|
|
{
|
|
xmlSecKeysMngrPtr pMngr = nullptr ;
|
|
xmlSecEncCtxPtr pEncCtx = nullptr ;
|
|
xmlNodePtr pEncryptedData = nullptr ;
|
|
xmlNodePtr pContent = nullptr ;
|
|
|
|
if( !aTemplate.is() )
|
|
throw RuntimeException() ;
|
|
|
|
if( !aEnvironment.is() )
|
|
throw RuntimeException() ;
|
|
|
|
//Get Keys Manager
|
|
Reference< XUnoTunnel > xSecTunnel( aEnvironment , UNO_QUERY ) ;
|
|
if( !xSecTunnel.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
SecurityEnvironment_MSCryptImpl* pSecEnv = reinterpret_cast<SecurityEnvironment_MSCryptImpl*>(xSecTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ));
|
|
if( pSecEnv == nullptr )
|
|
throw RuntimeException() ;
|
|
|
|
//Get the encryption template
|
|
Reference< XXMLElementWrapper > xTemplate = aTemplate->getTemplate() ;
|
|
if( !xTemplate.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
Reference< XUnoTunnel > xTplTunnel( xTemplate , UNO_QUERY ) ;
|
|
if( !xTplTunnel.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
XMLElementWrapper_XmlSecImpl* pTemplate = reinterpret_cast<XMLElementWrapper_XmlSecImpl*>(xTplTunnel->getSomething( XMLElementWrapper_XmlSecImpl::getUnoTunnelImplementationId() ));
|
|
if( pTemplate == nullptr ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
pEncryptedData = pTemplate->getNativeElement() ;
|
|
|
|
//Find the element to be encrypted.
|
|
//This element is wrapped in the CipherValue sub-element.
|
|
xmlNodePtr pCipherData = pEncryptedData->children;
|
|
while (pCipherData != nullptr && stricmp(reinterpret_cast<const char *>(pCipherData->name), "CipherData"))
|
|
{
|
|
pCipherData = pCipherData->next;
|
|
}
|
|
|
|
if( pCipherData == nullptr ) {
|
|
throw XMLEncryptionException() ;
|
|
}
|
|
|
|
xmlNodePtr pCipherValue = pCipherData->children;
|
|
while (pCipherValue != nullptr && stricmp(reinterpret_cast<const char *>(pCipherValue->name), "CipherValue"))
|
|
{
|
|
pCipherValue = pCipherValue->next;
|
|
}
|
|
|
|
if( pCipherValue == nullptr ) {
|
|
throw XMLEncryptionException() ;
|
|
}
|
|
|
|
pContent = pCipherValue->children;
|
|
|
|
if( pContent == nullptr ) {
|
|
throw XMLEncryptionException() ;
|
|
}
|
|
|
|
xmlUnlinkNode(pContent);
|
|
xmlAddNextSibling(pEncryptedData, pContent);
|
|
|
|
//remember the position of the element to be signed
|
|
bool isParentRef = true;
|
|
xmlNodePtr pParent = pEncryptedData->parent;
|
|
xmlNodePtr referenceNode;
|
|
|
|
if (pEncryptedData == pParent->children)
|
|
{
|
|
referenceNode = pParent;
|
|
}
|
|
else
|
|
{
|
|
referenceNode = pEncryptedData->prev;
|
|
isParentRef = false;
|
|
}
|
|
|
|
setErrorRecorder( );
|
|
|
|
pMngr = pSecEnv->createKeysManager();
|
|
if( !pMngr ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
//Create Encryption context
|
|
pEncCtx = xmlSecEncCtxCreate( pMngr ) ;
|
|
if( pEncCtx == nullptr )
|
|
{
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
//throw XMLEncryptionException() ;
|
|
clearErrorRecorder();
|
|
return aTemplate;
|
|
}
|
|
|
|
//Encrypt the template
|
|
if( xmlSecEncCtxXmlEncrypt( pEncCtx , pEncryptedData , pContent ) < 0 ) {
|
|
aTemplate->setStatus(css::xml::crypto::SecurityOperationStatus_UNKNOWN);
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
clearErrorRecorder();
|
|
return aTemplate;
|
|
}
|
|
aTemplate->setStatus(css::xml::crypto::SecurityOperationStatus_OPERATION_SUCCEEDED);
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
|
|
//get the new EncryptedData element
|
|
if (isParentRef)
|
|
{
|
|
pTemplate->setNativeElement(referenceNode->children) ;
|
|
}
|
|
else
|
|
{
|
|
pTemplate->setNativeElement(referenceNode->next);
|
|
}
|
|
|
|
clearErrorRecorder();
|
|
return aTemplate ;
|
|
}
|
|
|
|
/* XXMLEncryption */
|
|
Reference< XXMLEncryptionTemplate > SAL_CALL
|
|
XMLEncryption_MSCryptImpl::decrypt(
|
|
const Reference< XXMLEncryptionTemplate >& aTemplate ,
|
|
const Reference< XXMLSecurityContext >& aSecurityCtx
|
|
) {
|
|
xmlSecKeysMngrPtr pMngr = nullptr ;
|
|
xmlSecEncCtxPtr pEncCtx = nullptr ;
|
|
xmlNodePtr pEncryptedData = nullptr ;
|
|
|
|
if( !aTemplate.is() )
|
|
throw RuntimeException() ;
|
|
|
|
if( !aSecurityCtx.is() )
|
|
throw RuntimeException() ;
|
|
|
|
//Get Keys Manager
|
|
Reference< XSecurityEnvironment > xSecEnv
|
|
= aSecurityCtx->getSecurityEnvironmentByIndex(
|
|
aSecurityCtx->getDefaultSecurityEnvironmentIndex());
|
|
Reference< XUnoTunnel > xSecTunnel( xSecEnv , UNO_QUERY ) ;
|
|
if( !xSecTunnel.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
SecurityEnvironment_MSCryptImpl* pSecEnv = reinterpret_cast<SecurityEnvironment_MSCryptImpl*>(xSecTunnel->getSomething( SecurityEnvironment_MSCryptImpl::getUnoTunnelId() ));
|
|
if( pSecEnv == nullptr )
|
|
throw RuntimeException() ;
|
|
|
|
//Get the encryption template
|
|
Reference< XXMLElementWrapper > xTemplate = aTemplate->getTemplate() ;
|
|
if( !xTemplate.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
Reference< XUnoTunnel > xTplTunnel( xTemplate , UNO_QUERY ) ;
|
|
if( !xTplTunnel.is() ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
XMLElementWrapper_XmlSecImpl* pTemplate = reinterpret_cast<XMLElementWrapper_XmlSecImpl*>(xTplTunnel->getSomething( XMLElementWrapper_XmlSecImpl::getUnoTunnelImplementationId() ));
|
|
if( pTemplate == nullptr ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
pEncryptedData = pTemplate->getNativeElement() ;
|
|
|
|
//remember the position of the element to be signed
|
|
bool isParentRef = true;
|
|
xmlNodePtr pParent = pEncryptedData->parent;
|
|
xmlNodePtr referenceNode;
|
|
|
|
if (pEncryptedData == pParent->children)
|
|
{
|
|
referenceNode = pParent;
|
|
}
|
|
else
|
|
{
|
|
referenceNode = pEncryptedData->prev;
|
|
isParentRef = false;
|
|
}
|
|
|
|
setErrorRecorder( );
|
|
|
|
pMngr = pSecEnv->createKeysManager();
|
|
if( !pMngr ) {
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
//Create Encryption context
|
|
pEncCtx = xmlSecEncCtxCreate( pMngr ) ;
|
|
if( pEncCtx == nullptr )
|
|
{
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
//throw XMLEncryptionException() ;
|
|
clearErrorRecorder();
|
|
return aTemplate;
|
|
}
|
|
|
|
//Decrypt the template
|
|
if( xmlSecEncCtxDecrypt( pEncCtx , pEncryptedData ) < 0 || pEncCtx->result == nullptr ) {
|
|
aTemplate->setStatus(css::xml::crypto::SecurityOperationStatus_UNKNOWN);
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
|
|
//throw XMLEncryptionException() ;
|
|
clearErrorRecorder();
|
|
return aTemplate;
|
|
}
|
|
aTemplate->setStatus(css::xml::crypto::SecurityOperationStatus_OPERATION_SUCCEEDED);
|
|
#if 0 // This code block has been commented out since 2004,
|
|
// but let's keep it here in case it contains some useful hints
|
|
// for future work.
|
|
if( pEncCtx->resultReplaced != 0 ) {
|
|
pContent = pEncryptedData ;
|
|
|
|
Reference< XUnoTunnel > xTunnel( ret , UNO_QUERY ) ;
|
|
if( !xTunnel.is() ) {
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
throw RuntimeException() ;
|
|
}
|
|
XMLElementWrapper_XmlSecImpl* pNode = ( XMLElementWrapper_XmlSecImpl* )xTunnel->getSomething( XMLElementWrapper_XmlSecImpl::getUnoTunnelImplementationId() ) ;
|
|
if( pNode == NULL ) {
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
throw RuntimeException() ;
|
|
}
|
|
|
|
pNode->setNativeElement( pContent ) ;
|
|
} else {
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
throw RuntimeException() ;
|
|
}
|
|
#endif // 0
|
|
|
|
//Destroy the encryption context
|
|
xmlSecEncCtxDestroy( pEncCtx ) ;
|
|
SecurityEnvironment_MSCryptImpl::destroyKeysManager( pMngr );
|
|
|
|
//get the decrypted element
|
|
XMLElementWrapper_XmlSecImpl * ret = new XMLElementWrapper_XmlSecImpl(isParentRef?
|
|
(referenceNode->children):(referenceNode->next));
|
|
|
|
//return ret;
|
|
aTemplate->setTemplate(ret);
|
|
|
|
clearErrorRecorder();
|
|
return aTemplate;
|
|
}
|
|
|
|
/* XServiceInfo */
|
|
OUString SAL_CALL XMLEncryption_MSCryptImpl::getImplementationName() {
|
|
return impl_getImplementationName() ;
|
|
}
|
|
|
|
/* XServiceInfo */
|
|
sal_Bool SAL_CALL XMLEncryption_MSCryptImpl::supportsService( const OUString& serviceName) {
|
|
Sequence< OUString > seqServiceNames = getSupportedServiceNames() ;
|
|
const OUString* pArray = seqServiceNames.getConstArray() ;
|
|
for( sal_Int32 i = 0 ; i < seqServiceNames.getLength() ; i ++ ) {
|
|
if( *( pArray + i ) == serviceName )
|
|
return true ;
|
|
}
|
|
return false ;
|
|
}
|
|
|
|
/* XServiceInfo */
|
|
Sequence< OUString > SAL_CALL XMLEncryption_MSCryptImpl::getSupportedServiceNames() {
|
|
return impl_getSupportedServiceNames() ;
|
|
}
|
|
|
|
//Helper for XServiceInfo
|
|
Sequence< OUString > XMLEncryption_MSCryptImpl::impl_getSupportedServiceNames() {
|
|
::osl::Guard< ::osl::Mutex > aGuard( ::osl::Mutex::getGlobalMutex() ) ;
|
|
Sequence<OUString> seqServiceNames { "com.sun.star.xml.crypto.XMLEncryption" };
|
|
return seqServiceNames ;
|
|
}
|
|
|
|
OUString XMLEncryption_MSCryptImpl::impl_getImplementationName() {
|
|
return OUString("com.sun.star.xml.security.bridge.xmlsec.XMLEncryption_MSCryptImpl") ;
|
|
}
|
|
|
|
//Helper for registry
|
|
Reference< XInterface > SAL_CALL XMLEncryption_MSCryptImpl::impl_createInstance( const Reference< XMultiServiceFactory >& aServiceManager ) {
|
|
return Reference< XInterface >( *new XMLEncryption_MSCryptImpl( aServiceManager ) ) ;
|
|
}
|
|
|
|
Reference< XSingleServiceFactory > XMLEncryption_MSCryptImpl::impl_createFactory( const Reference< XMultiServiceFactory >& aServiceManager ) {
|
|
//Reference< XSingleServiceFactory > xFactory ;
|
|
//xFactory = ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName , impl_createInstance , impl_getSupportedServiceNames ) ;
|
|
//return xFactory ;
|
|
return ::cppu::createSingleFactory( aServiceManager , impl_getImplementationName() , impl_createInstance , impl_getSupportedServiceNames() ) ;
|
|
}
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|