okular/ui/signatureguiutils.cpp
Chinmoy Ranjan Pradhan a234a902dc Implement digital signature support for PDF
This is a squash of the original branch

It also contains fixes/rework from Albert Astals Cid

If you're interested in its history have a look at the
gsoc2018_digitalsignature branch

The poppler dependency situation is:
 * With 0.51 you get most signature information
 * With 0.68 you also get signature location/reason information
 * With 0.73 you also get signature certificate information
2019-01-10 23:13:54 +01:00

153 lines
5.9 KiB
C++

/***************************************************************************
* Copyright (C) 2018 by Chinmoy Ranjan Pradhan <chinmoyrp65@gmail.com> *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
***************************************************************************/
#include "signatureguiutils.h"
#include <KLocalizedString>
#include "core/form.h"
#include "core/page.h"
#include "core/document.h"
namespace SignatureGuiUtils {
QVector<const Okular::FormFieldSignature*> getSignatureFormFields( Okular::Document *doc, bool allPages, int pageNum )
{
uint curPage = allPages ? 0 : pageNum;
const uint endPage = allPages ? doc->pages() - 1 : pageNum;
QVector<const Okular::FormFieldSignature*> signatureFormFields;
while ( curPage <= endPage )
{
foreach ( Okular::FormField *f, doc->page( curPage++ )->formFields() )
{
if ( f->type() == Okular::FormField::FormSignature )
{
signatureFormFields.append( static_cast<Okular::FormFieldSignature*>( f ) );
}
}
}
return signatureFormFields;
}
QString getReadableSignatureStatus( Okular::SignatureInfo::SignatureStatus sigStatus )
{
switch ( sigStatus )
{
case Okular::SignatureInfo::SignatureValid:
return i18n("The signature is cryptographically valid.");
case Okular::SignatureInfo::SignatureInvalid:
return i18n("The signature is cryptographically invalid.");
case Okular::SignatureInfo::SignatureDigestMismatch:
return i18n("Digest Mismatch occurred.");
case Okular::SignatureInfo::SignatureDecodingError:
return i18n("The signature CMS/PKCS7 structure is malformed.");
case Okular::SignatureInfo::SignatureNotFound:
return i18n("The requested signature is not present in the document.");
default:
return i18n("The signature could not be verified.");
}
}
QString getReadableCertStatus( Okular::SignatureInfo::CertificateStatus certStatus )
{
switch ( certStatus )
{
case Okular::SignatureInfo::CertificateTrusted:
return i18n("Certificate is Trusted.");
case Okular::SignatureInfo::CertificateUntrustedIssuer:
return i18n("Certificate issuer isn't Trusted.");
case Okular::SignatureInfo::CertificateUnknownIssuer:
return i18n("Certificate issuer is unknown.");
case Okular::SignatureInfo::CertificateRevoked:
return i18n("Certificate has been Revoked.");
case Okular::SignatureInfo::CertificateExpired:
return i18n("Certificate has Expired.");
case Okular::SignatureInfo::CertificateNotVerified:
return i18n("Certificate has not yet been verified.");
default:
return i18n("Unknown issue with Certificate or corrupted data.");
}
}
QString getReadableHashAlgorithm( Okular::SignatureInfo::HashAlgorithm hashAlg )
{
switch ( hashAlg )
{
case Okular::SignatureInfo::HashAlgorithmMd2:
return i18n("MD2");
case Okular::SignatureInfo::HashAlgorithmMd5:
return i18n("MD5");
case Okular::SignatureInfo::HashAlgorithmSha1:
return i18n("SHA1");
case Okular::SignatureInfo::HashAlgorithmSha256:
return i18n("SHA256");
case Okular::SignatureInfo::HashAlgorithmSha384:
return i18n("SHA384");
case Okular::SignatureInfo::HashAlgorithmSha512:
return i18n("SHA512");
case Okular::SignatureInfo::HashAlgorithmSha224:
return i18n("SHA224");
default:
return i18n("Unknown Algorithm");
}
}
QString getReadablePublicKeyType( Okular::CertificateInfo::PublicKeyType type )
{
switch ( type )
{
case Okular::CertificateInfo::RsaKey:
return i18n("RSA");
case Okular::CertificateInfo::DsaKey:
return i18n("DSA");
case Okular::CertificateInfo::EcKey:
return i18n("EC");
case Okular::CertificateInfo::OtherKey:
return i18n("Unknown Type");
}
return i18n("Unknown Type");
}
QString getReadableKeyUsage( Okular::CertificateInfo::KeyUsageExtensions kuExtensions, const QString &separator )
{
QStringList ku;
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuDigitalSignature ) )
ku << i18n("Digital Signature");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuNonRepudiation ) )
ku << i18n("Non-Repudiation");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuKeyEncipherment ) )
ku << i18n("Encrypt Keys");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuDataEncipherment ) )
ku << i18n("Decrypt Keys");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuKeyAgreement ) )
ku << i18n("Key Agreement");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuKeyCertSign ) )
ku << i18n("Sign Certificate");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuClrSign ) )
ku << i18n("Sign CRL");
if ( kuExtensions.testFlag( Okular::CertificateInfo::KuEncipherOnly ) )
ku << i18n("Encrypt Only");
if ( ku.isEmpty() )
ku << i18n("No Usage Specified");
return ku.join(separator);
}
QString getReadableKeyUsageCommaSeparated( Okular::CertificateInfo::KeyUsageExtensions kuExtensions )
{
return getReadableKeyUsage(kuExtensions, i18nc("Joins the various ways a signature key can be used in a longer string", ", "));
}
QString getReadableKeyUsageNewLineSeparated( Okular::CertificateInfo::KeyUsageExtensions kuExtensions )
{
return getReadableKeyUsage(kuExtensions, QStringLiteral("\n"));
}
}