You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
143 lines
5.2 KiB
143 lines
5.2 KiB
/* |
|
SPDX-FileCopyrightText: 2018 Chinmoy Ranjan Pradhan <chinmoyrp65@gmail.com> |
|
|
|
SPDX-License-Identifier: GPL-2.0-or-later |
|
*/ |
|
|
|
#include "signatureguiutils.h" |
|
|
|
#include <KLocalizedString> |
|
|
|
#include "core/document.h" |
|
#include "core/form.h" |
|
#include "core/page.h" |
|
|
|
namespace SignatureGuiUtils |
|
{ |
|
QVector<const Okular::FormFieldSignature *> getSignatureFormFields(Okular::Document *doc, bool allPages, int pageNum) |
|
{ |
|
uint curPage = allPages ? 0 : pageNum; |
|
const uint endPage = allPages ? doc->pages() - 1 : pageNum; |
|
QVector<const Okular::FormFieldSignature *> signatureFormFields; |
|
while (curPage <= endPage) { |
|
const QLinkedList<Okular::FormField *> formFields = doc->page(curPage++)->formFields(); |
|
for (Okular::FormField *f : formFields) { |
|
if (f->type() == Okular::FormField::FormSignature) { |
|
signatureFormFields.append(static_cast<Okular::FormFieldSignature *>(f)); |
|
} |
|
} |
|
} |
|
return signatureFormFields; |
|
} |
|
|
|
QString getReadableSignatureStatus(Okular::SignatureInfo::SignatureStatus sigStatus) |
|
{ |
|
switch (sigStatus) { |
|
case Okular::SignatureInfo::SignatureValid: |
|
return i18n("The signature is cryptographically valid."); |
|
case Okular::SignatureInfo::SignatureInvalid: |
|
return i18n("The signature is cryptographically invalid."); |
|
case Okular::SignatureInfo::SignatureDigestMismatch: |
|
return i18n("Digest Mismatch occurred."); |
|
case Okular::SignatureInfo::SignatureDecodingError: |
|
return i18n("The signature CMS/PKCS7 structure is malformed."); |
|
case Okular::SignatureInfo::SignatureNotFound: |
|
return i18n("The requested signature is not present in the document."); |
|
default: |
|
return i18n("The signature could not be verified."); |
|
} |
|
} |
|
|
|
QString getReadableCertStatus(Okular::SignatureInfo::CertificateStatus certStatus) |
|
{ |
|
switch (certStatus) { |
|
case Okular::SignatureInfo::CertificateTrusted: |
|
return i18n("Certificate is Trusted."); |
|
case Okular::SignatureInfo::CertificateUntrustedIssuer: |
|
return i18n("Certificate issuer isn't Trusted."); |
|
case Okular::SignatureInfo::CertificateUnknownIssuer: |
|
return i18n("Certificate issuer is unknown."); |
|
case Okular::SignatureInfo::CertificateRevoked: |
|
return i18n("Certificate has been Revoked."); |
|
case Okular::SignatureInfo::CertificateExpired: |
|
return i18n("Certificate has Expired."); |
|
case Okular::SignatureInfo::CertificateNotVerified: |
|
return i18n("Certificate has not yet been verified."); |
|
default: |
|
return i18n("Unknown issue with Certificate or corrupted data."); |
|
} |
|
} |
|
|
|
QString getReadableHashAlgorithm(Okular::SignatureInfo::HashAlgorithm hashAlg) |
|
{ |
|
switch (hashAlg) { |
|
case Okular::SignatureInfo::HashAlgorithmMd2: |
|
return i18n("MD2"); |
|
case Okular::SignatureInfo::HashAlgorithmMd5: |
|
return i18n("MD5"); |
|
case Okular::SignatureInfo::HashAlgorithmSha1: |
|
return i18n("SHA1"); |
|
case Okular::SignatureInfo::HashAlgorithmSha256: |
|
return i18n("SHA256"); |
|
case Okular::SignatureInfo::HashAlgorithmSha384: |
|
return i18n("SHA384"); |
|
case Okular::SignatureInfo::HashAlgorithmSha512: |
|
return i18n("SHA512"); |
|
case Okular::SignatureInfo::HashAlgorithmSha224: |
|
return i18n("SHA224"); |
|
default: |
|
return i18n("Unknown Algorithm"); |
|
} |
|
} |
|
|
|
QString getReadablePublicKeyType(Okular::CertificateInfo::PublicKeyType type) |
|
{ |
|
switch (type) { |
|
case Okular::CertificateInfo::RsaKey: |
|
return i18n("RSA"); |
|
case Okular::CertificateInfo::DsaKey: |
|
return i18n("DSA"); |
|
case Okular::CertificateInfo::EcKey: |
|
return i18n("EC"); |
|
case Okular::CertificateInfo::OtherKey: |
|
return i18n("Unknown Type"); |
|
} |
|
|
|
return i18n("Unknown Type"); |
|
} |
|
|
|
QString getReadableKeyUsage(Okular::CertificateInfo::KeyUsageExtensions kuExtensions, const QString &separator) |
|
{ |
|
QStringList ku; |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuDigitalSignature)) |
|
ku << i18n("Digital Signature"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuNonRepudiation)) |
|
ku << i18n("Non-Repudiation"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuKeyEncipherment)) |
|
ku << i18n("Encrypt Keys"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuDataEncipherment)) |
|
ku << i18n("Decrypt Keys"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuKeyAgreement)) |
|
ku << i18n("Key Agreement"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuKeyCertSign)) |
|
ku << i18n("Sign Certificate"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuClrSign)) |
|
ku << i18n("Sign CRL"); |
|
if (kuExtensions.testFlag(Okular::CertificateInfo::KuEncipherOnly)) |
|
ku << i18n("Encrypt Only"); |
|
if (ku.isEmpty()) |
|
ku << i18n("No Usage Specified"); |
|
return ku.join(separator); |
|
} |
|
|
|
QString getReadableKeyUsageCommaSeparated(Okular::CertificateInfo::KeyUsageExtensions kuExtensions) |
|
{ |
|
return getReadableKeyUsage(kuExtensions, i18nc("Joins the various ways a signature key can be used in a longer string", ", ")); |
|
} |
|
|
|
QString getReadableKeyUsageNewLineSeparated(Okular::CertificateInfo::KeyUsageExtensions kuExtensions) |
|
{ |
|
return getReadableKeyUsage(kuExtensions, QStringLiteral("\n")); |
|
} |
|
|
|
}
|
|
|