/************************************************************************* * * $RCSfile: performance.cxx,v $ * * $Revision: 1.2 $ * * last change: $Author: rt $ $Date: 2005-05-18 10:01:55 $ * * The Contents of this file are made available subject to the terms of * either of the following licenses * * - GNU Lesser General Public License Version 2.1 * - Sun Industry Standards Source License Version 1.1 * * Sun Microsystems Inc., October, 2000 * * GNU Lesser General Public License Version 2.1 * ============================================= * Copyright 2000 by Sun Microsystems, Inc. * 901 San Antonio Road, Palo Alto, CA 94303, USA * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License version 2.1, as published by the Free Software Foundation. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, * MA 02111-1307 USA * * * Sun Industry Standards Source License Version 1.1 * ================================================= * The contents of this file are subject to the Sun Industry Standards * Source License Version 1.1 (the "License"); You may not use this file * except in compliance with the License. You may obtain a copy of the * License at http://www.openoffice.org/license.html. * * Software provided under this License is provided on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, * WITHOUT LIMITATION, WARRANTIES THAT THE SOFTWARE IS FREE OF DEFECTS, * MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE, OR NON-INFRINGING. * See the License for the specific provisions governing your rights and * obligations concerning the Software. * * The Initial Developer of the Original Code is: Sun Microsystems, Inc. * * Copyright: 2000 by Sun Microsystems, Inc. * * All Rights Reserved. * * Contributor(s): _______________________________________ * * ************************************************************************/ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include //#include #include #include #include /* * Can not build under solaris. * Delete the memory.h including by AF #include */ #include #include #include #ifndef INCLUDED_VECTOR #include #define INCLUDED_VECTOR #endif #ifndef INCLUDED_STACK #include #define INCLUDED_STACK #endif /* xml security framework components */ #define SIGNATURECREATOR_COMPONENT "com.sun.star.xml.crypto.sax.SignatureCreator" #define SIGNATUREVERIFIER_COMPONENT "com.sun.star.xml.crypto.sax.SignatureVerifier" #define JAVAFLATFILTER_COMPONENT "com.sun.star.xml.crypto.eval.JavaFlatFilter" #define SAXEVENTKEEPER_COMPONENT "com.sun.star.xml.crypto.sax.SAXEventKeeper" /* java based bridge components */ #define SEINITIALIZER_JAVA_COMPONENT "com.sun.star.xml.security.bridge.jxsec.SEInitializer_JxsecImpl" #define XMLSIGNATURE_JAVA_COMPONENT "com.sun.star.xml.security.bridge.jxsec.XMLSignature_JxsecImpl" #define XMLDOCUMENTWRAPPER_JAVA_COMPONENT "com.sun.star.xml.security.bridge.jxsec.XMLDocumentWrapper_JxsecImpl" /* c based bridge components */ #define SEINITIALIZER_C_COMPONENT "com.sun.star.xml.crypto.SEInitializer" #define XMLSIGNATURE_C_COMPONENT "com.sun.star.xml.crypto.XMLSignature" #define XMLDOCUMENT_C_COMPONENT "com.sun.star.xml.wrapper.XMLDocumentWrapper" /* security related elements and attributes */ #define SIGNATURE_STR "Signature" #define REFERENCE_STR "Reference" #define SIGNEDINFO_STR "SignedInfo" #define KEYINFO_STR "KeyInfo" #define KEYVALUE_STR "KeyValue" #define KEYNAME_STR "KeyName" #define X509DATA_STR "X509Data" #define ENCRYPTEDKEY_STR "EncryptedKey" #define RETRIEVALMETHOD_STR "RetrievalMethod" #define OTHER_ELEMENT_STR "OTHER_ELEMENT_STR" #define REFNUM_ATTR_STR "refNum" #define URI_ATTR_STR "URI" #define RTL_ASCII_USTRINGPARAM( asciiStr ) asciiStr, strlen( asciiStr ), RTL_TEXTENCODING_ASCII_US namespace cssu = com::sun::star::uno; namespace cssl = com::sun::star::lang; namespace cssb = com::sun::star::beans; namespace cssi = com::sun::star::io; namespace cssxc = com::sun::star::xml::crypto; namespace cssxs = com::sun::star::xml::sax; namespace cssxw = com::sun::star::xml::wrapper; namespace cssxcsax = com::sun::star::xml::csax; using namespace ::com::sun::star; class XSecTester; /* * The XSecTester class is a C++ version of SecurityFramworkController.java * */ class SecurityEntity { private: static int m_nNextSecurityId; rtl::OUString m_ouKeyURI; protected: com::sun::star::uno::Reference< com::sun::star::lang::XMultiServiceFactory > mxMSF; com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XReferenceResolvedListener > m_xReferenceListener; com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XSecuritySAXEventKeeper > m_xSAXEventKeeper; com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSecurityContext > m_xXMLSecurityContext; com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSignature > m_xXMLSignature; int m_nSecurityId; private: int getNextSecurityId() const; protected: SecurityEntity( const com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XSecuritySAXEventKeeper >& xSAXEventKeeper, const com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSecurityContext >& xXMLSecurityContext, const com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSignature >& xXMLSignature, const com::sun::star::uno::Reference< com::sun::star::lang::XMultiServiceFactory >& rsMSF); public: void setKeyId(int nId); int getSecurityId() const; com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XReferenceResolvedListener > getReferenceListener() const; bool setKey( const rtl::OUString& ouUri, bool bIsExporting ); void setKeyURI(const rtl::OUString& ouUri); bool endMission(); }; class SignatureEntity : public SecurityEntity { private: std::vector< rtl::OUString > m_vReferenceIds; int m_nSignatureElementCollectorId; bool hasReference(const rtl::OUString& ouUri) const; public: SignatureEntity( const com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XSecuritySAXEventKeeper >& xSAXEventKeeper, bool bIsExporting, XSecTester* pListener, const com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSecurityContext >& xXMLSecurityContext, const com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSignature >& xXMLSignature, const com::sun::star::uno::Reference< com::sun::star::lang::XMultiServiceFactory >& rsMSF); ~SignatureEntity(){}; void setReferenceNumber() const; bool setReference( const rtl::OUString& ouUri, bool bIsExporting ) const; void addReferenceURI( const rtl::OUString& ouUri ); }; struct AncestorEvent { AncestorEvent( sal_Int32 nAttrNum ):aAttributeList(nAttrNum){}; bool bIsStartElement; rtl::OUString ouName; com::sun::star::uno::Sequence< com::sun::star::xml::csax::XMLAttribute > aAttributeList; }; class XSecTester : public cppu::WeakImplHelper4 < com::sun::star::xml::crypto::sax::XSignatureCreationResultListener, com::sun::star::xml::crypto::sax::XSignatureVerifyResultListener, com::sun::star::xml::crypto::sax::XSAXEventKeeperStatusChangeListener, com::sun::star::xml::sax::XDocumentHandler > { private: com::sun::star::uno::Reference< com::sun::star::lang::XMultiServiceFactory > mxMSF; sal_Int32 m_nTotalSignatureNumber; sal_Int32 m_nSuccessfulSignatureNumber; com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler > m_xExportHandler; com::sun::star::uno::Reference< com::sun::star::xml::crypto::sax::XSecuritySAXEventKeeper > m_xSAXEventKeeper; com::sun::star::uno::Reference< com::sun::star::xml::wrapper::XXMLDocumentWrapper > m_xXMLDocumentWrapper; com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler > m_xOutputHandler; com::sun::star::uno::Reference< com::sun::star::xml::sax::XParser > m_xSaxParser; std::stack< void* > m_stCurrentPath; std::stack< bool > m_stCurrentPathType; std::vector< AncestorEvent* > m_vAncestorEvents; std::vector< SignatureEntity* > m_vSignatureList; std::vector< rtl::OUString > m_vUnsolvedReferenceURIs; std::vector< int > m_vUnsolvedReferenceKeeperIds; std::vector< int > m_vUnsolvedReferenceRefNums; bool m_bIsExporting; bool m_bIsBlocking; bool m_bIsInsideCollectedElement; bool m_bIsSAXEventKeeperOnTheSAXChain; com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSecurityContext > m_xXMLSecurityContext; com::sun::star::uno::Reference< com::sun::star::xml::crypto::XXMLSignature > m_xXMLSignature; rtl::OUString m_ouJavaCryptokenDir; rtl::OUString m_ouCCryptokenDir; rtl::OUString m_ouXMLDocumentWrapperComponentName; private: com::sun::star::uno::Reference< com::sun::star::io::XOutputStream > createOutputStream( const rtl::OUString& ouFile ); rtl::OUString parseFile( const rtl::OUString& ouInputFileName, const rtl::OUString& ouOutputFileName, bool bIsExporting, bool bIsJavaBased); void changeOutput(); bool foundSecurityRelated(); void findKeyOrReference(SecurityEntity* pSecurityEntity, const rtl::OUString& ouUri, bool bIsFindKey); bool checkSecurityElement( const rtl::OUString& ouLocalName, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XAttributeList>& xAttribs); void checkReference( const rtl::OUString& ouLocalName, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XAttributeList>& xAttribs, const rtl::OUString& ouId); void endMission(); void addStartAncestorEvent( const rtl::OUString& ouName, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XAttributeList>& xAttribs); void addEndAncestorEvent( const rtl::OUString& ouName ); void flushAncestorEvents( const com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler >& xDocumentHandler); void XSecTester::sendAncestorStartElementEvent( const rtl::OUString& ouName, const com::sun::star::uno::Sequence< com::sun::star::xml::csax::XMLAttribute >& xAttrList, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler >& xDocumentHandler) const; void XSecTester::sendAncestorEndElementEvent( const rtl::OUString& ouName, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler >& xDocumentHandler) const; std::vector< AncestorEvent* >::const_iterator XSecTester::checkAncestorStartElementEvent( const std::vector< AncestorEvent* >::const_iterator& ii, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XDocumentHandler >& xDocumentHandler) const; public: XSecTester(const com::sun::star::uno::Reference< com::sun::star::lang::XMultiServiceFactory >& rxMSF) :mxMSF( rxMSF ){}; virtual ~XSecTester(){}; /* XSignatureCreationResultListener */ virtual void SAL_CALL signatureCreated( sal_Int32 securityId, com::sun::star::xml::crypto::SecurityOperationStatus creationResult ) throw (com::sun::star::uno::RuntimeException); /* XSignatureVerifyResultListener */ virtual void SAL_CALL signatureVerified( sal_Int32 securityId, com::sun::star::xml::crypto::SecurityOperationStatus verifyResult ) throw (com::sun::star::uno::RuntimeException); /* XSAXEventKeeperStatusChangeListener */ virtual void SAL_CALL blockingStatusChanged( sal_Bool isBlocking ) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL collectionStatusChanged( sal_Bool isInsideCollectedElement ) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL bufferStatusChanged( sal_Bool isBufferEmpty ) throw (com::sun::star::uno::RuntimeException); /* XXMLSecTester */ virtual rtl::OUString SAL_CALL transfer_without_sec( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isBridgeInvolved) throw (com::sun::star::uno::RuntimeException); virtual rtl::OUString SAL_CALL export_xml( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isJavaBased) throw (com::sun::star::uno::RuntimeException); virtual rtl::OUString SAL_CALL import_xml( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isJavaBased) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL setCryptoDir( const rtl::OUString & javaDirName, const rtl::OUString & cDirName) throw (com::sun::star::uno::RuntimeException); /* XDocumentHandler */ virtual void SAL_CALL endDocument() throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL startDocument() throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL characters(const class rtl::OUString&) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL processingInstruction(const rtl::OUString&, const rtl::OUString&) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL ignorableWhitespace(const rtl::OUString&) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL startElement( const rtl::OUString&, const com::sun::star::uno::Reference< com::sun::star::xml::sax::XAttributeList >&) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL endElement(const rtl::OUString&) throw (com::sun::star::uno::RuntimeException); virtual void SAL_CALL setDocumentLocator( const com::sun::star::uno::Reference< com::sun::star::xml::sax::XLocator >&) throw (com::sun::star::uno::RuntimeException); }; rtl::OUString XSecTester::parseFile( const rtl::OUString& ouInputFileName, const rtl::OUString& ouOutputFileName, bool bIsExporting, bool bIsJavaBased) { rtl::OUString ouMessage; cssu::Reference xInputStream = OpenInputStream(ouInputFileName); if (xInputStream != NULL ) { /* initialization */ rtl::OUString SEInitializer_comp; rtl::OUString XMLSignature_comp; rtl::OUString tokenPath; cssu::Reference < cssxc::XSEInitializer > xSEInitializer; if (bIsJavaBased) { SEInitializer_comp = rtl::OUString::createFromAscii( SEINITIALIZER_JAVA_COMPONENT ); XMLSignature_comp = rtl::OUString::createFromAscii( XMLSIGNATURE_JAVA_COMPONENT); m_ouXMLDocumentWrapperComponentName = rtl::OUString::createFromAscii( XMLDOCUMENTWRAPPER_JAVA_COMPONENT ); tokenPath = m_ouJavaCryptokenDir; } else { SEInitializer_comp = rtl::OUString::createFromAscii( SEINITIALIZER_C_COMPONENT ); XMLSignature_comp = rtl::OUString::createFromAscii( XMLSIGNATURE_C_COMPONENT); m_ouXMLDocumentWrapperComponentName = rtl::OUString::createFromAscii( XMLDOCUMENT_C_COMPONENT ); tokenPath = m_ouCCryptokenDir; } xSEInitializer = cssu::Reference < cssxc::XSEInitializer > ( mxMSF->createInstance( SEInitializer_comp ), cssu::UNO_QUERY ); m_xXMLSignature = cssu::Reference ( mxMSF->createInstance( XMLSignature_comp ), cssu::UNO_QUERY ); if ( xSEInitializer.is() && m_xXMLSignature.is()) { /* create SAX Parser */ const rtl::OUString sSaxParser ( RTL_CONSTASCII_USTRINGPARAM( "com.sun.star.xml.sax.Parser") ); m_xSaxParser = cssu::Reference < cssxs::XParser > ( mxMSF->createInstance( sSaxParser ), cssu::UNO_QUERY ); /* create SAX Writer */ const rtl::OUString sSaxWriter ( RTL_CONSTASCII_USTRINGPARAM( "com.sun.star.xml.sax.Writer") ); cssu::Reference < cssi::XActiveDataSource > xSaxWriter ( mxMSF->createInstance( sSaxWriter ), cssu::UNO_QUERY ); cssu::Reference< cssi::XOutputStream > xOutputStream = OpenOutputStream(ouOutputFileName); xSaxWriter->setOutputStream( xOutputStream ); cssxs::InputSource aInput; aInput.sSystemId = ouInputFileName; aInput.aInputStream = xInputStream; cssu::Reference < cssxs::XDocumentHandler > xSaxWriterHandler( xSaxWriter, cssu::UNO_QUERY); m_xXMLSecurityContext = xSEInitializer->createSecurityContext(tokenPath); m_bIsExporting = bIsExporting; m_xExportHandler = xSaxWriterHandler; m_xOutputHandler = xSaxWriterHandler; m_xXMLDocumentWrapper = NULL; m_xSAXEventKeeper = NULL; m_bIsSAXEventKeeperOnTheSAXChain = false; m_bIsBlocking = false; m_bIsInsideCollectedElement = false; OSL_ASSERT(m_vSignatureList.size() == 0); OSL_ASSERT(m_vUnsolvedReferenceURIs.size() == 0); OSL_ASSERT(m_vUnsolvedReferenceKeeperIds.size() == 0); OSL_ASSERT(m_vUnsolvedReferenceRefNums.size() == 0); OSL_ASSERT(m_stCurrentPath.empty()); OSL_ASSERT(m_stCurrentPathType.empty()); OSL_ASSERT(m_vAncestorEvents.empty()); changeOutput(); /* foundSecurityRelated(); */ /* Begin to parse */ TimeValue startTime, endTime; osl_getSystemTime( &startTime ); xSaxWriterHandler->startDocument(); if (m_bIsExporting) { m_xSaxParser->setDocumentHandler(this); m_xSaxParser->parseStream(aInput); } else { m_xSaxParser->setDocumentHandler(this); m_xSaxParser->parseStream(aInput); } endMission(); xSaxWriterHandler->endDocument(); osl_getSystemTime( &endTime ); flushAncestorEvents( NULL ); // Bug in SAXWriter, done in endDocument() // xOutputStream->closeOutput(); xInputStream->closeInput(); /* * Free the security context */ xSEInitializer->freeSecurityContext(m_xXMLSecurityContext); m_xXMLSecurityContext = NULL; /* Calculate the time */ double diff = ((double)((endTime.Nanosec + endTime.Seconds*1000000000.0) - (startTime.Nanosec + startTime.Seconds*1000000000.0))) / ((double)1000000000.0); char buf[32]; sprintf(buf, "%.2f", diff); ouMessage += rtl::OUString(RTL_ASCII_USTRINGPARAM(buf)); } else { ouMessage += rtl::OUString::createFromAscii( "N/A" ); } } else { ouMessage += rtl::OUString::createFromAscii( "-" ); } return ouMessage; } /* XSignatureCreationResultListener */ void SAL_CALL XSecTester::signatureCreated( sal_Int32 securityId, cssxc::SecurityOperationStatus creationResult ) throw (cssu::RuntimeException) { m_nTotalSignatureNumber++; if (creationResult == cssxc::SecurityOperationStatus_OPERATION_SUCCEEDED) { m_nSuccessfulSignatureNumber++; } } /* XSignatureVerifyResultListener */ void SAL_CALL XSecTester::signatureVerified( sal_Int32 securityId, cssxc::SecurityOperationStatus verifyResult ) throw (cssu::RuntimeException) { m_nTotalSignatureNumber++; if (verifyResult == cssxc::SecurityOperationStatus_OPERATION_SUCCEEDED) { m_nSuccessfulSignatureNumber++; } } /* XSAXEventKeeperStatusChangeListener */ void SAL_CALL XSecTester::blockingStatusChanged( sal_Bool isBlocking ) throw (cssu::RuntimeException) { this->m_bIsBlocking = isBlocking; } void SAL_CALL XSecTester::collectionStatusChanged( sal_Bool isInsideCollectedElement ) throw (cssu::RuntimeException) { this->m_bIsInsideCollectedElement = isInsideCollectedElement; if ( !m_bIsInsideCollectedElement && !m_bIsBlocking) { m_bIsSAXEventKeeperOnTheSAXChain = false; } else { m_bIsSAXEventKeeperOnTheSAXChain = true; } changeOutput(); } void SAL_CALL XSecTester::bufferStatusChanged( sal_Bool isBufferEmpty ) throw (cssu::RuntimeException) { if (isBufferEmpty) { m_xXMLDocumentWrapper = NULL; m_xSAXEventKeeper = NULL; m_bIsSAXEventKeeperOnTheSAXChain = false; changeOutput(); } } /* XXMLSecTester */ rtl::OUString SAL_CALL XSecTester::export_xml( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isJavaBased) throw (cssu::RuntimeException) { rtl::OUString ouMessage; m_nTotalSignatureNumber = 0; m_nSuccessfulSignatureNumber = 0; ouMessage += parseFile(inputFileName, outputFileName, sal_True, isJavaBased); rtl::OUString ouRemark = rtl::OUString::valueOf(m_nSuccessfulSignatureNumber) + rtl::OUString(RTL_ASCII_USTRINGPARAM( "/" )) + rtl::OUString::valueOf(m_nTotalSignatureNumber); ouMessage += rtl::OUString(RTL_ASCII_USTRINGPARAM("\t")) + ouRemark; return ouMessage; } rtl::OUString SAL_CALL XSecTester::import_xml( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isJavaBased) throw (cssu::RuntimeException) { rtl::OUString ouMessage; m_nTotalSignatureNumber = 0; m_nSuccessfulSignatureNumber = 0; ouMessage += parseFile(inputFileName, outputFileName, sal_False, isJavaBased); rtl::OUString ouRemark = rtl::OUString::valueOf(m_nSuccessfulSignatureNumber) + rtl::OUString(RTL_ASCII_USTRINGPARAM( "/" )) + rtl::OUString::valueOf(m_nTotalSignatureNumber); ouMessage += rtl::OUString(RTL_ASCII_USTRINGPARAM("\t")) + ouRemark; return ouMessage; } rtl::OUString SAL_CALL XSecTester::transfer_without_sec( const rtl::OUString& inputFileName, const rtl::OUString& outputFileName, sal_Bool isBridgeInvolved) throw (cssu::RuntimeException) { rtl::OUString ouMessage; cssu::Reference< cssi::XInputStream > xInputStream = OpenInputStream(inputFileName); if (xInputStream != NULL ) { /* create SAX Parser */ const rtl::OUString sSaxParser ( RTL_CONSTASCII_USTRINGPARAM( "com.sun.star.xml.sax.Parser") ); m_xSaxParser = cssu::Reference < cssxs::XParser > ( mxMSF->createInstance( sSaxParser ), cssu::UNO_QUERY ); /* create SAX Writer */ const rtl::OUString sSaxWriter ( RTL_CONSTASCII_USTRINGPARAM( "com.sun.star.xml.sax.Writer") ); cssu::Reference < cssi::XActiveDataSource > xSaxWriter ( mxMSF->createInstance( sSaxWriter ), cssu::UNO_QUERY ); cssu::Reference < cssxs::XDocumentHandler > xSaxWriterHandler( xSaxWriter, cssu::UNO_QUERY); if (!isBridgeInvolved) { /* connect the SAX Parser and the SAX Writer */ m_xSaxParser->setDocumentHandler ( xSaxWriterHandler ); } else { /* create Java Flat Filter */ const rtl::OUString sJavaFlatFilter( RTL_CONSTASCII_USTRINGPARAM( JAVAFLATFILTER_COMPONENT ) ); cssu::Reference < cssxs::XParser > xJavaFilterParser ( mxMSF->createInstance( sJavaFlatFilter ), cssu::UNO_QUERY ); cssu::Reference < cssxs::XDocumentHandler > xJavaFilterHandler( xJavaFilterParser, cssu::UNO_QUERY ); if ( !xJavaFilterParser.is() ) return rtl::OUString::createFromAscii( "NO JAVA" ); /* connect the SAX Parser, the Java Flat Filter and the SAX Writer */ xJavaFilterParser->setDocumentHandler( xSaxWriterHandler ); m_xSaxParser->setDocumentHandler ( xJavaFilterHandler ); } /* set output stream */ cssu::Reference< cssi::XOutputStream > xOutputStream = OpenOutputStream(outputFileName); xSaxWriter->setOutputStream( xOutputStream ); /* prepare input stream */ cssxs::InputSource aInput; aInput.sSystemId = inputFileName; aInput.aInputStream = xInputStream; TimeValue startTime, endTime; osl_getSystemTime( &startTime ); m_xSaxParser->parseStream ( aInput ); // xOutputStream->closeOutput(); xInputStream->closeInput(); osl_getSystemTime( &endTime ); double diff = ((double)((endTime.Nanosec + endTime.Seconds*1000000000.0) - (startTime.Nanosec + startTime.Seconds*1000000000.0)))/((double)1000000000.0); char buf[32]; sprintf(buf, "%.2f", diff); ouMessage += rtl::OUString(RTL_ASCII_USTRINGPARAM(buf)); } return ouMessage; } void SAL_CALL XSecTester::setCryptoDir(const rtl::OUString & javaDirName, const rtl::OUString & cDirName) throw (cssu::RuntimeException) { m_ouJavaCryptokenDir = javaDirName; m_ouCCryptokenDir = cDirName; } cssu::Reference< cssu::XInterface > SAL_CALL XSecTester_createInstance( const cssu::Reference< cssl::XMultiServiceFactory > & rSMgr) throw( cssu::Exception ) { return (cppu::OWeakObject*) new XSecTester( rSMgr ); } int SecurityEntity::m_nNextSecurityId = 1; SecurityEntity::SecurityEntity( const cssu::Reference& xSAXEventKeeper, const cssu::Reference& xXMLSecurityContext, const cssu::Reference& xXMLSignature, const cssu::Reference< cssl::XMultiServiceFactory > &rsMSF) :m_xSAXEventKeeper(xSAXEventKeeper), m_xXMLSecurityContext(xXMLSecurityContext), m_xXMLSignature(xXMLSignature), mxMSF(rsMSF), m_ouKeyURI(RTL_ASCII_USTRINGPARAM("")) { m_nSecurityId = getNextSecurityId(); } int SecurityEntity::getNextSecurityId() const { int nId = m_nNextSecurityId++; return nId; } void SecurityEntity::setKeyId(int nId) { cssu::Reference keyCollector (m_xReferenceListener, cssu::UNO_QUERY); keyCollector->setKeyId(nId); } void SecurityEntity::setKeyURI(const rtl::OUString& ouUri) { m_ouKeyURI = ouUri; } cssu::Reference SecurityEntity::getReferenceListener() const { return m_xReferenceListener; } int SecurityEntity::getSecurityId() const { return m_nSecurityId; } bool SecurityEntity::setKey(const rtl::OUString& ouUri, bool bIsExporting) { bool rc = false; if (m_ouKeyURI != rtl::OUString(RTL_ASCII_USTRINGPARAM("")) && m_ouKeyURI == ouUri) { int nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector( bIsExporting ? (cssxc::sax::ElementMarkPriority_BEFOREMODIFY): (cssxc::sax::ElementMarkPriority_AFTERMODIFY), true); setKeyId(nKeeperId); m_xSAXEventKeeper->setSecurityId(nKeeperId, m_nSecurityId); cssu::Reference xReferenceResolvedBroadcaster (m_xSAXEventKeeper, cssu::UNO_QUERY); xReferenceResolvedBroadcaster->addReferenceResolvedListener(nKeeperId, m_xReferenceListener); rc = true; } return rc; } bool SecurityEntity::endMission() { cssu::Reference xMissionTaker (m_xReferenceListener, cssu::UNO_QUERY); return xMissionTaker->endMission(); } SignatureEntity::SignatureEntity( const cssu::Reference& xSAXEventKeeper, bool bIsExporting, XSecTester* pListener, const cssu::Reference& xXMLSecurityContext, const cssu::Reference& xXMLSignature, const cssu::Reference< cssl::XMultiServiceFactory >& rsMSF) :SecurityEntity(xSAXEventKeeper, xXMLSecurityContext, xXMLSignature, rsMSF) { if (bIsExporting) { m_nSignatureElementCollectorId = m_xSAXEventKeeper->addSecurityElementCollector( cssxc::sax::ElementMarkPriority_AFTERMODIFY, true); m_xSAXEventKeeper->setSecurityId(m_nSignatureElementCollectorId, m_nSecurityId); m_xReferenceListener = cssu::Reference< cssxc::sax::XReferenceResolvedListener >( mxMSF->createInstance( rtl::OUString::createFromAscii( SIGNATURECREATOR_COMPONENT )), cssu::UNO_QUERY); cssu::Reference xInitialization(m_xReferenceListener, cssu::UNO_QUERY); cssu::Sequence args(5); char buf[16]; sprintf(buf, "%d", m_nSecurityId); args[0] = cssu::makeAny(rtl::OUString(RTL_ASCII_USTRINGPARAM(buf))); args[1] = cssu::makeAny(m_xSAXEventKeeper); sprintf(buf, "%d", m_nSignatureElementCollectorId); args[2] = cssu::makeAny(rtl::OUString(RTL_ASCII_USTRINGPARAM(buf))); args[3] = cssu::makeAny(m_xXMLSecurityContext->getSecurityEnvironment()); args[4] = cssu::makeAny(m_xXMLSignature); xInitialization->initialize(args); int nBlockerId = m_xSAXEventKeeper->addBlocker(); m_xSAXEventKeeper->setSecurityId(nBlockerId, m_nSecurityId); cssu::Reference xBlockerMonitor(m_xReferenceListener, cssu::UNO_QUERY); xBlockerMonitor->setBlockerId(nBlockerId); cssu::Reference< cssxc::sax::XSignatureCreationResultBroadcaster > xSignatureCreationResultBroadcaster (m_xReferenceListener, cssu::UNO_QUERY); xSignatureCreationResultBroadcaster->addSignatureCreationResultListener(pListener); } else { m_nSignatureElementCollectorId = m_xSAXEventKeeper->addSecurityElementCollector( cssxc::sax::ElementMarkPriority_BEFOREMODIFY, false); m_xSAXEventKeeper->setSecurityId(m_nSignatureElementCollectorId, m_nSecurityId); m_xReferenceListener = cssu::Reference< cssxc::sax::XReferenceResolvedListener >( mxMSF->createInstance( rtl::OUString::createFromAscii( SIGNATUREVERIFIER_COMPONENT )), cssu::UNO_QUERY); cssu::Reference xInitialization(m_xReferenceListener, cssu::UNO_QUERY); cssu::Sequence args(5); char buf[16]; sprintf(buf, "%d", m_nSecurityId); args[0] = cssu::makeAny(rtl::OUString(RTL_ASCII_USTRINGPARAM(buf))); args[1] = cssu::makeAny(m_xSAXEventKeeper); sprintf(buf, "%d", m_nSignatureElementCollectorId); args[2] = cssu::makeAny(rtl::OUString(RTL_ASCII_USTRINGPARAM(buf))); args[3] = cssu::makeAny(m_xXMLSecurityContext); args[4] = cssu::makeAny(m_xXMLSignature); xInitialization->initialize(args); cssu::Reference< cssxc::sax::XSignatureVerifyResultBroadcaster > xSignatureVerifyResultBroadcaster (m_xReferenceListener, cssu::UNO_QUERY); xSignatureVerifyResultBroadcaster->addSignatureVerifyResultListener(pListener); } cssu::Reference xReferenceResolvedBroadcaster (m_xSAXEventKeeper, cssu::UNO_QUERY); xReferenceResolvedBroadcaster->addReferenceResolvedListener( m_nSignatureElementCollectorId, m_xReferenceListener); } void SignatureEntity::addReferenceURI(const rtl::OUString& ouUri) { m_vReferenceIds.push_back(ouUri); } void SignatureEntity::setReferenceNumber() const { cssu::Reference xReferenceCollector (m_xReferenceListener, cssu::UNO_QUERY); xReferenceCollector->setReferenceCount(m_vReferenceIds.size()); } bool SignatureEntity::hasReference(const rtl::OUString& ouUri) const { bool rc = false; std::vector::const_iterator ii; for (ii = m_vReferenceIds.begin(); ii != m_vReferenceIds.end(); ++ii) { if (ouUri == *ii) { rc = true; break; } } return rc; } bool SignatureEntity::setReference(const rtl::OUString& ouUri, bool bIsExporting) const { bool rc = false; if (hasReference(ouUri)) { int nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector( bIsExporting ? (cssxc::sax::ElementMarkPriority_AFTERMODIFY): (cssxc::sax::ElementMarkPriority_BEFOREMODIFY), false); m_xSAXEventKeeper->setSecurityId(nKeeperId, m_nSecurityId); cssu::Reference xReferenceResolvedBroadcaster (m_xSAXEventKeeper, cssu::UNO_QUERY); xReferenceResolvedBroadcaster->addReferenceResolvedListener(nKeeperId, m_xReferenceListener); cssu::Reference xReferenceCollector (m_xReferenceListener, cssu::UNO_QUERY); xReferenceCollector->setReferenceId(nKeeperId); rc = true; } return rc; } /* XDocumentHandler */ void SAL_CALL XSecTester::startDocument() throw (cssu::RuntimeException) { } void SAL_CALL XSecTester::endDocument() throw (cssu::RuntimeException) { } void SAL_CALL XSecTester::characters(const class rtl::OUString & chars) throw (cssu::RuntimeException) { m_xExportHandler->characters(chars); } void SAL_CALL XSecTester::processingInstruction(const rtl::OUString & target, const rtl::OUString &data) throw (cssu::RuntimeException) { m_xExportHandler->processingInstruction(target, data); } void SAL_CALL XSecTester::ignorableWhitespace(const rtl::OUString &) throw (cssu::RuntimeException) { } void SAL_CALL XSecTester::startElement(const rtl::OUString & name, const cssu::Reference &xAttribs) throw (cssu::RuntimeException) { rtl::OUString ouIdAttr = xAttribs->getValueByName( rtl::OUString(RTL_ASCII_USTRINGPARAM("id"))); if (ouIdAttr == NULL) { ouIdAttr = xAttribs->getValueByName( rtl::OUString(RTL_ASCII_USTRINGPARAM("Id"))); } bool bHasIdAttr = (ouIdAttr != NULL && ouIdAttr.getLength() > 0 ); bool needResend = false; if (bHasIdAttr || name.equalsAscii( SIGNATURE_STR )) { if (foundSecurityRelated() && ! m_bIsExporting) { needResend = true; } } if ( !m_bIsSAXEventKeeperOnTheSAXChain ) { addStartAncestorEvent(name, xAttribs); } bool bSuppressingForwarding = checkSecurityElement(name, xAttribs); checkReference(name, xAttribs, ouIdAttr); if (needResend) { m_xSAXEventKeeper->setNextHandler(NULL); cssu::Reference xSAXEventKeeperHandler (m_xSAXEventKeeper, cssu::UNO_QUERY); xSAXEventKeeperHandler->startElement(name, xAttribs); m_xSAXEventKeeper->setNextHandler(this); } if (!bSuppressingForwarding) { m_xExportHandler->startElement(name, xAttribs); } } void SAL_CALL XSecTester::endElement(const rtl::OUString& name) throw (cssu::RuntimeException) { if (!m_stCurrentPath.empty()) { void* pSignedInfo = m_stCurrentPath.top(); bool bIsStringType = m_stCurrentPathType.top(); m_stCurrentPath.pop(); m_stCurrentPathType.pop(); if (bIsStringType && !strcmp((const char *)pSignedInfo, SIGNEDINFO_STR)) { if (!m_stCurrentPath.empty()) { void* pSignature = m_stCurrentPath.top(); bIsStringType = m_stCurrentPathType.top(); if (!bIsStringType && pSignature != NULL) { ((SignatureEntity *) pSignature)->setReferenceNumber(); } } } } if ( !m_bIsSAXEventKeeperOnTheSAXChain ) { addEndAncestorEvent(name); } m_xExportHandler->endElement(name); } void SAL_CALL XSecTester::setDocumentLocator( const cssu::Reference& ) throw (cssu::RuntimeException) { } void XSecTester::changeOutput() { if (m_bIsExporting) { if (m_bIsSAXEventKeeperOnTheSAXChain) { m_xExportHandler = cssu::Reference (m_xSAXEventKeeper, cssu::UNO_QUERY); m_xSAXEventKeeper->setNextHandler(NULL); flushAncestorEvents(m_xExportHandler); m_xSAXEventKeeper->setNextHandler(m_xOutputHandler); } else { m_xExportHandler = m_xOutputHandler; } } else { if (m_bIsSAXEventKeeperOnTheSAXChain) { cssu::Reference xSAXEventKeeperHandler (m_xSAXEventKeeper, cssu::UNO_QUERY); m_xSAXEventKeeper->setNextHandler(NULL); flushAncestorEvents(xSAXEventKeeperHandler); m_xSaxParser->setDocumentHandler(xSAXEventKeeperHandler); m_xSAXEventKeeper->setNextHandler(this); } else { m_xSaxParser->setDocumentHandler(this); } } } bool XSecTester::foundSecurityRelated() { if (m_xSAXEventKeeper == NULL) { m_bIsBlocking = false; m_bIsInsideCollectedElement = false; m_xXMLDocumentWrapper = cssu::Reference (mxMSF->createInstance( m_ouXMLDocumentWrapperComponentName ), cssu::UNO_QUERY); m_xSAXEventKeeper = cssu::Reference< cssxc::sax::XSecuritySAXEventKeeper > (mxMSF->createInstance( rtl::OUString::createFromAscii( SAXEVENTKEEPER_COMPONENT )), cssu::UNO_QUERY); cssu::Reference xInitialization(m_xSAXEventKeeper, cssu::UNO_QUERY); cssu::Sequence arg(1); arg[0] = cssu::makeAny(m_xXMLDocumentWrapper); xInitialization->initialize(arg); cssu::Reference xSAXEventKeeperStatusChangeBroadcaster(m_xSAXEventKeeper, cssu::UNO_QUERY); xSAXEventKeeperStatusChangeBroadcaster->addSAXEventKeeperStatusChangeListener(this); } bool rc = false; if (!m_bIsSAXEventKeeperOnTheSAXChain) { rc = true; } m_bIsSAXEventKeeperOnTheSAXChain=true; changeOutput(); return rc; } void XSecTester::findKeyOrReference(SecurityEntity* pSecurityEntity, const rtl::OUString& ouUri, bool bIsFindingKey) { std::vector::iterator ii_referenceURIs; std::vector::iterator ii_referenceKeeperIds; std::vector::iterator ii_referenceRefNums; for (ii_referenceURIs = m_vUnsolvedReferenceURIs.begin(), ii_referenceKeeperIds = m_vUnsolvedReferenceKeeperIds.begin(), ii_referenceRefNums = m_vUnsolvedReferenceRefNums.begin(); ii_referenceURIs != m_vUnsolvedReferenceURIs.end(); ) { rtl::OUString ouReferenceUri = *ii_referenceURIs; if (ouReferenceUri == ouUri) { int nKeeperId = *ii_referenceKeeperIds; int nRefNum = *ii_referenceRefNums; if ( bIsFindingKey ) { int nClonedKeeperId = m_xSAXEventKeeper->cloneElementCollector( nKeeperId, m_bIsExporting? (cssxc::sax::ElementMarkPriority_BEFOREMODIFY): (cssxc::sax::ElementMarkPriority_AFTERMODIFY)); pSecurityEntity->setKeyId(nClonedKeeperId); m_xSAXEventKeeper->setSecurityId(nClonedKeeperId, pSecurityEntity->getSecurityId()); cssu::Reference xReferenceResolvedBroadcaster(m_xSAXEventKeeper, cssu::UNO_QUERY); xReferenceResolvedBroadcaster->addReferenceResolvedListener( nClonedKeeperId, pSecurityEntity->getReferenceListener()); } else { int nClonedKeeperId = m_xSAXEventKeeper->cloneElementCollector( nKeeperId, m_bIsExporting? (cssxc::sax::ElementMarkPriority_AFTERMODIFY): (cssxc::sax::ElementMarkPriority_BEFOREMODIFY)); m_xSAXEventKeeper->setSecurityId(nClonedKeeperId, pSecurityEntity->getSecurityId()); cssu::Reference xReferenceResolvedBroadcaster (m_xSAXEventKeeper, cssu::UNO_QUERY); xReferenceResolvedBroadcaster->addReferenceResolvedListener( nClonedKeeperId, pSecurityEntity->getReferenceListener()); cssu::Reference xReferenceCollector (pSecurityEntity->getReferenceListener(), cssu::UNO_QUERY); xReferenceCollector->setReferenceId(nClonedKeeperId); } nRefNum--; if (nRefNum == 0) { m_xSAXEventKeeper->removeElementCollector(nKeeperId); ii_referenceURIs = m_vUnsolvedReferenceURIs.erase(ii_referenceURIs); ii_referenceKeeperIds = m_vUnsolvedReferenceKeeperIds.erase(ii_referenceKeeperIds); ii_referenceRefNums = m_vUnsolvedReferenceRefNums.erase(ii_referenceRefNums); } else { (*ii_referenceRefNums) = nRefNum; ii_referenceURIs++; ii_referenceKeeperIds++; ii_referenceRefNums++; } if (bIsFindingKey) { break; } } else { ii_referenceURIs++; ii_referenceKeeperIds++; ii_referenceRefNums++; } } } bool XSecTester::checkSecurityElement( const rtl::OUString& ouLocalName, const cssu::Reference& xAttribs) { bool rc = false; if (ouLocalName.equalsAscii(SIGNATURE_STR)) { SignatureEntity* pSignatureEntity = new SignatureEntity( m_xSAXEventKeeper, m_bIsExporting, this, m_xXMLSecurityContext, m_xXMLSignature, mxMSF); m_vSignatureList.push_back(pSignatureEntity); m_stCurrentPath.push(pSignatureEntity); m_stCurrentPathType.push(false); } else if (ouLocalName.equalsAscii(REFERENCE_STR)) { if (!m_stCurrentPath.empty()) { void* pSignedInfo = m_stCurrentPath.top(); bool bIsStringType = m_stCurrentPathType.top(); m_stCurrentPath.pop(); m_stCurrentPathType.pop(); if (bIsStringType && !m_stCurrentPath.empty()) { void* pSignature = m_stCurrentPath.top(); bool bIsStringType2 = m_stCurrentPathType.top(); if (!strcmp((const char*)pSignedInfo, SIGNEDINFO_STR) && !bIsStringType2) { rtl::OUString ouUri = xAttribs->getValueByName (rtl::OUString(RTL_ASCII_USTRINGPARAM( URI_ATTR_STR ))); if (ouUri.matchAsciiL("#", 1, 0)) { rtl::OUString uri = ouUri.copy(1); SignatureEntity* pSignatureEntity = (SignatureEntity *)pSignature; if (uri != NULL && uri.getLength()>0) { pSignatureEntity->addReferenceURI(uri); findKeyOrReference(pSignatureEntity, uri, true); } } } } m_stCurrentPath.push(pSignedInfo); m_stCurrentPathType.push(bIsStringType); } m_stCurrentPath.push( (void *)REFERENCE_STR); m_stCurrentPathType.push(true); } else if(ouLocalName.equalsAscii(KEYVALUE_STR) || ouLocalName.equalsAscii(KEYNAME_STR) || ouLocalName.equalsAscii(X509DATA_STR) || ouLocalName.equalsAscii(ENCRYPTEDKEY_STR)) { if (!m_stCurrentPath.empty()) { void* pKeyInfo = m_stCurrentPath.top(); bool bIsStringType = m_stCurrentPathType.top(); m_stCurrentPath.pop(); m_stCurrentPathType.pop(); if (bIsStringType && !m_stCurrentPath.empty()) { bool bIsStringType2 = m_stCurrentPathType.top(); if (!bIsStringType2) { SecurityEntity *pSecurityEntity = (SecurityEntity *) (m_stCurrentPath.top()); pSecurityEntity->setKeyId(0); } } m_stCurrentPath.push(pKeyInfo); m_stCurrentPathType.push(bIsStringType); } m_stCurrentPath.push((void *)KEYVALUE_STR); m_stCurrentPathType.push(true); } else if(ouLocalName.equalsAscii(RETRIEVALMETHOD_STR)) { if (!m_stCurrentPath.empty()) { void* pKeyInfo = m_stCurrentPath.top(); bool bIsStringType = m_stCurrentPathType.top(); m_stCurrentPath.pop(); m_stCurrentPathType.pop(); if (bIsStringType && !m_stCurrentPath.empty()) { bool bIsStringType2 = m_stCurrentPathType.top(); if (!bIsStringType2) { SecurityEntity *pSecurityEntity = (SecurityEntity *) m_stCurrentPath.top(); rtl::OUString ouUri = xAttribs->getValueByName( rtl::OUString(RTL_ASCII_USTRINGPARAM( URI_ATTR_STR ))); if (!strcmp((const char *)pKeyInfo, KEYINFO_STR) && ouUri != NULL && ouUri.getLength()>0) { pSecurityEntity->setKeyURI(ouUri); findKeyOrReference(pSecurityEntity, ouUri, true); } } } m_stCurrentPath.push(pKeyInfo); m_stCurrentPathType.push(bIsStringType); } m_stCurrentPath.push((void *)RETRIEVALMETHOD_STR); m_stCurrentPathType.push(true); } else if(ouLocalName.equalsAscii(KEYINFO_STR)) { m_stCurrentPath.push((void *)KEYINFO_STR); m_stCurrentPathType.push(true); } else if(ouLocalName.equalsAscii(SIGNEDINFO_STR)) { m_stCurrentPath.push((void *)SIGNEDINFO_STR); m_stCurrentPathType.push(true); } else { m_stCurrentPath.push((void *)OTHER_ELEMENT_STR); m_stCurrentPathType.push(true); } return rc; } void XSecTester::checkReference( const rtl::OUString& ouLocalName, const cssu::Reference& xAttribs, const rtl::OUString& ouId) { rtl::OUString refNumStr = xAttribs->getValueByName(rtl::OUString(RTL_ASCII_USTRINGPARAM(REFNUM_ATTR_STR))); if (ouId != NULL && ouId.getLength()>0 ) { int nRefNum = 999; if (refNumStr != NULL && refNumStr.getLength()>0 ) { nRefNum = refNumStr.toInt32(); } int nLength = m_vSignatureList.size(); for (int i = 0; isetReference(ouId, m_bIsExporting)) { nRefNum--; } if (pSignatureEntity->setKey(ouId, m_bIsExporting)) { nRefNum--; } } if (nRefNum>0) { int nKeeperId; if (ouLocalName.equalsAscii(ENCRYPTEDKEY_STR)) { nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector( m_bIsExporting ? (cssxc::sax::ElementMarkPriority_BEFOREMODIFY): (cssxc::sax::ElementMarkPriority_AFTERMODIFY), true); } else { nKeeperId = m_xSAXEventKeeper->addSecurityElementCollector( m_bIsExporting? (cssxc::sax::ElementMarkPriority_AFTERMODIFY): (cssxc::sax::ElementMarkPriority_BEFOREMODIFY), false); } m_vUnsolvedReferenceURIs.push_back(ouId); m_vUnsolvedReferenceKeeperIds.push_back(nKeeperId); m_vUnsolvedReferenceRefNums.push_back(nRefNum); } } } void XSecTester::endMission() { while (m_vSignatureList.size() > 0) { if (m_vSignatureList.size()>0) { SignatureEntity * pSignatureEntity = m_vSignatureList.at(0); m_vSignatureList.erase(m_vSignatureList.begin()); pSignatureEntity->endMission(); delete pSignatureEntity; } } while (m_vUnsolvedReferenceURIs.size()>0) { int nKeeperId = m_vUnsolvedReferenceKeeperIds.at(0); m_xSAXEventKeeper->removeElementCollector(nKeeperId); m_vUnsolvedReferenceURIs.erase(m_vUnsolvedReferenceURIs.begin()); m_vUnsolvedReferenceKeeperIds.erase(m_vUnsolvedReferenceKeeperIds.begin()); m_vUnsolvedReferenceRefNums.erase(m_vUnsolvedReferenceRefNums.begin()); } } void XSecTester::addStartAncestorEvent( const rtl::OUString& ouName, const cssu::Reference< cssxs::XAttributeList >& xAttribs) { sal_Int32 nLength = xAttribs->getLength(); AncestorEvent* ancestorEvent = new AncestorEvent( nLength ); ancestorEvent->bIsStartElement = true; ancestorEvent->ouName = ouName; for (int i = 0; iaAttributeList[i]).sName = xAttribs->getNameByIndex((short)i); (ancestorEvent->aAttributeList[i]).sValue =xAttribs->getValueByIndex((short)i); } m_vAncestorEvents.push_back(ancestorEvent); } void XSecTester::addEndAncestorEvent(const rtl::OUString& ouName) { AncestorEvent* ancestorEvent = new AncestorEvent(0); ancestorEvent->bIsStartElement = false; ancestorEvent->ouName = ouName; m_vAncestorEvents.push_back(ancestorEvent); } void XSecTester::sendAncestorStartElementEvent( const rtl::OUString& ouName, const cssu::Sequence< cssxcsax::XMLAttribute >& attrList, const cssu::Reference< cssxs::XDocumentHandler >& xDocumentHandler) const { SvXMLAttributeList* pAttributeList = new SvXMLAttributeList(); cssu::Reference < cssxs::XAttributeList > xAttrList = cssu::Reference< cssxs::XAttributeList > (pAttributeList); sal_Int32 nLength = attrList.getLength(); for (int i = 0; iAddAttribute( attrList[i].sName, attrList[i].sValue); } xDocumentHandler->startElement(ouName, xAttrList); } void XSecTester::sendAncestorEndElementEvent( const rtl::OUString& ouName, const cssu::Reference< cssxs::XDocumentHandler >& xDocumentHandler) const { xDocumentHandler->endElement(ouName); } std::vector< AncestorEvent* >::const_iterator XSecTester::checkAncestorStartElementEvent( const std::vector< AncestorEvent* >::const_iterator& ii, const cssu::Reference< cssxs::XDocumentHandler >& xDocumentHandler) const { std::vector< AncestorEvent* >::const_iterator next = ii+1; if (next == m_vAncestorEvents.end()) { sendAncestorStartElementEvent( (*ii)->ouName, (*ii)->aAttributeList, xDocumentHandler); } else { while ((next != m_vAncestorEvents.end()) && ((*next)->bIsStartElement)) { next = checkAncestorStartElementEvent(next, xDocumentHandler); } if (next != m_vAncestorEvents.end()) { next++; } } return next; } void XSecTester::flushAncestorEvents( const cssu::Reference< cssxs::XDocumentHandler >& xDocumentHandler) { std::vector< AncestorEvent* >::const_iterator ii; if (xDocumentHandler != NULL) { ii = m_vAncestorEvents.begin(); while (ii != m_vAncestorEvents.end()) { AncestorEvent* ancestorEvent = *ii; if (ancestorEvent->bIsStartElement) { ii = checkAncestorStartElementEvent(ii, xDocumentHandler); } else { sendAncestorEndElementEvent((*ii)->ouName, xDocumentHandler); ii++; } } } /* free the ancestor events list */ std::vector< AncestorEvent* >::iterator jj; while (m_vAncestorEvents.size()>0) { jj = m_vAncestorEvents.begin(); delete *jj; m_vAncestorEvents.erase(jj); } } /* * Get the length of a file in a platform independant fashion */ int getLength(const char *pInputFileName) { int nSize = 0; std::ifstream data(pInputFileName); data.seekg(0, std::ios_base::end); nSize = data.tellg(); return nSize; } void outputHeader() { fprintf(stderr, "%16s%4s%8s%12s%12s%12s%12s\n", "File Name", "E/I", "Size", "-C++", "-Java", "Forw-O", "No S/E"); fprintf(stderr, "===============================================================================\n"); } /* * print the output on the screen as well as in the GNUPlot data file */ void output(const rtl::OUString& ouInputFileName, const rtl::OUString& ouTime_C, const rtl::OUString& ouTime_Java, const rtl::OUString& ouTime_NoSecurity, const rtl::OUString& ouTime_JavaForwardOnly, const rtl::OUString& ouRemark_C, const rtl::OUString& ouRemark_Java, bool bIsExporting) { int nSize = getLength(rtl::OString(ouInputFileName, ouInputFileName.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); std::ofstream data; /* print screen */ int nPosition = ouInputFileName.lastIndexOf('\\'); rtl::OUString fileName = ouInputFileName.copy(nPosition + 1); fprintf(stderr, "%16s", rtl::OString(fileName, fileName.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); fprintf(stderr, "%4s", bIsExporting?"E":"I"); fprintf(stderr, "%7dK", nSize/1024); fprintf(stderr, "%8s %3s", rtl::OString(ouTime_C, ouTime_C.getLength(), RTL_TEXTENCODING_ASCII_US).getStr(), rtl::OString(ouRemark_C, ouRemark_C.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); fprintf(stderr, "%8s %3s", rtl::OString(ouTime_Java, ouTime_Java.getLength(), RTL_TEXTENCODING_ASCII_US).getStr(), rtl::OString(ouRemark_Java, ouRemark_Java.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); fprintf(stderr, "%12s", rtl::OString(ouTime_JavaForwardOnly, ouTime_JavaForwardOnly.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); fprintf(stderr, "%12s", rtl::OString(ouTime_NoSecurity, ouTime_NoSecurity.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); fprintf(stderr, "\n"); /* output the data as GNUPlot data file */ /* char str[32]; sprintf(str, "%d %s", nSize, rtl::OString(ouTime_C, ouTime_C.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); data.open("d:\\time_vs_size.txt", std::ios::app); data << str << std::endl; data.close(); sprintf(str, "%d %s", nSize, rtl::OString(ouTime_Java, ouTime_Java.getLength(), RTL_TEXTENCODING_ASCII_US).getStr()); data.open("d:\\time_vs_size_without_sec.txt", std::ios::app); data << str << std::endl; data.close(); */ } int main( int argc, char **argv ) { if (argc < 3) { fprintf(stderr, "Usage: testtool [] []\n"); exit (-1); } rtl::OUString aExportBatchFile = rtl::OUString::createFromAscii(argv[1]); rtl::OUString aImportBatchFile = rtl::OUString::createFromAscii(argv[2]); rtl::OUString aCPPCryptoToken; if ( argc > 3 ) aCPPCryptoToken = rtl::OUString::createFromAscii(argv[3]); rtl::OUString aJavaCryptoToken; if ( argc > 4 ) aJavaCryptoToken = rtl::OUString::createFromAscii(argv[4]); try { uno::Reference< lang::XMultiServiceFactory > xMSF = CreateDemoServiceFactory(); XSecTester* pTester = new XSecTester( xMSF ); uno::Reference< xml::sax::XDocumentHandler > xKeepARef = pTester; pTester->setCryptoDir( aJavaCryptoToken, aCPPCryptoToken ); rtl::OUString ouTime_C, ouTime_Java, ouTime_NoSecurity, ouTime_JavaForwardOnly; rtl::OUString ouInputFileName; rtl::OUString outputFileName1; rtl::OUString outputFileName2; rtl::OUString ouRemark_C, ouRemark_Java; outputHeader(); std::ifstream batch_export, batch_import; batch_export.open(OUStringToOString( aExportBatchFile, RTL_TEXTENCODING_ASCII_US ).getStr()); const int MAX_LINE = 80; char line[MAX_LINE + 1]; while (batch_export.getline(line, MAX_LINE)) { ouInputFileName = rtl::OUString::createFromAscii(line); int nPosition = ouInputFileName.lastIndexOf('.'); int nPosition1; /* * export the file with signautre/encryption (C++) */ outputFileName1 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-ex.xml"); ouTime_C = pTester->export_xml(ouInputFileName, outputFileName1, sal_False); nPosition1 = ouTime_C.lastIndexOf('\t'); ouRemark_C = ouTime_C.copy(nPosition1 + 1); ouTime_C = ouTime_C.copy(0, nPosition1); /* * export the file with signautre/encryption (Java) */ outputFileName1 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-ex2.xml"); ouTime_Java = pTester->export_xml(ouInputFileName, outputFileName1, sal_True); nPosition1 = ouTime_Java.lastIndexOf('\t'); ouRemark_Java = ouTime_Java.copy(nPosition1 + 1); ouTime_Java = ouTime_Java.copy(0, nPosition1); /* * export the file without signautre/encryption */ outputFileName2 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-ex-no.xml"); ouTime_NoSecurity = pTester->transfer_without_sec(ouInputFileName, outputFileName2, sal_False); /* * export the file with Java Flat Filter */ outputFileName2 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-ex-jf.xml"); ouTime_JavaForwardOnly = pTester->transfer_without_sec(ouInputFileName, outputFileName2, sal_True); /* * print output */ output(ouInputFileName, ouTime_C, ouTime_Java, ouTime_NoSecurity, ouTime_JavaForwardOnly, ouRemark_C, ouRemark_Java, true); } batch_export.close(); batch_import.open(OUStringToOString( aImportBatchFile, RTL_TEXTENCODING_ASCII_US ).getStr()); while (batch_import.getline(line, MAX_LINE)) { ouInputFileName = rtl::OUString::createFromAscii(line); int nPosition = ouInputFileName.lastIndexOf('.'); int nPosition1; /* * import the file with signautre/encryption (C++) */ outputFileName1 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-im.xml"); ouTime_C = pTester->import_xml(ouInputFileName, outputFileName1, sal_False); nPosition1 = ouTime_C.lastIndexOf('\t'); ouRemark_C = ouTime_C.copy(nPosition1 + 1); ouTime_C = ouTime_C.copy(0, nPosition1); /* * import the file with signautre/encryption (Java) */ outputFileName1 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-im2.xml"); ouTime_Java = pTester->import_xml(ouInputFileName, outputFileName1, sal_True); nPosition1 = ouTime_Java.lastIndexOf('\t'); ouRemark_Java = ouTime_Java.copy(nPosition1 + 1); ouTime_Java = ouTime_Java.copy(0, nPosition1); /* * import the file without signautre/encryption */ outputFileName2 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-im-no.xml"); ouTime_NoSecurity = pTester->transfer_without_sec(ouInputFileName, outputFileName2, sal_False); /* * import the file without signautre/encryption */ outputFileName2 = ouInputFileName.copy(0, nPosition) + rtl::OUString::createFromAscii("-im-jf.xml"); ouTime_JavaForwardOnly = pTester->transfer_without_sec(ouInputFileName, outputFileName2, sal_True); /* * print output */ output(ouInputFileName, ouTime_C, ouTime_Java, ouTime_NoSecurity, ouTime_JavaForwardOnly, ouRemark_C, ouRemark_Java, false); } batch_import.close(); fprintf(stderr, "\n"); } catch( cssu::Exception& e ) { fprintf( stderr , "\nEXCEPTION! Error Message: %s\n" , rtl::OUStringToOString( e.Message, RTL_TEXTENCODING_ASCII_US ).getStr() ) ; } return 0; }