office-gobmx/xmlsecurity
Gabor Kelemen 75ed566894 Add script to find unused using declarations
As a complementer to clang-tidy-12 --checks="-*,misc-unused-using-decls"
Pros:
- simple, fast!
- finds some more unused declarations, somehow
- works on non-linux specific parts of the code
- clang-tidy (for me) trips on files with external headers, this does not

Change-Id: If2db989114ac5c2841ed2e89ff7bd7a9e419f567
Reviewed-on: https://gerrit.libreoffice.org/c/core/+/150612
Tested-by: Jenkins
Reviewed-by: Miklos Vajna <vmiklos@collabora.com>
2023-04-25 08:09:28 +02:00
..
doc
inc Update libxmlsec to 1.3.0 2023-04-25 08:05:16 +02:00
qa Remove some unused includes 2023-04-17 19:01:11 +02:00
source Add script to find unused using declarations 2023-04-25 08:09:28 +02:00
test_docs
uiconfig/ui
util
workben Move tools/diagnose_ex.h to comphelper/diagnose_ex.hxx 2022-08-18 17:10:19 +02:00
AllLangMoTarget_xsc.mk
CppunitTest_qa_certext.mk
CppunitTest_xmlsecurity_dialogs_test.mk
CppunitTest_xmlsecurity_pdfsigning.mk
CppunitTest_xmlsecurity_signing.mk CppunitTest_xmlsecurity_signing2: inherit from UnoApiXmlTest 2022-12-01 16:45:45 +01:00
CppunitTest_xmlsecurity_signing2.mk CppunitTest_xmlsecurity_signing2: inherit from UnoApiXmlTest 2022-12-01 16:45:45 +01:00
Executable_pdfverify.mk
IwyuFilter_xmlsecurity.yaml Remove some unused includes 2022-11-24 08:09:53 +01:00
Library_xmlsecurity.mk
Library_xsec_xmlsec.mk Revert all the recent loplugin:unocast changes 2023-01-05 11:45:51 +00:00
Makefile
Module_xmlsecurity.mk CppunitTest_xmlsecurity_signing2: inherit from UnoApiXmlTest 2022-12-01 16:45:45 +01:00
README.md
UIConfig_xmlsec.mk

Stuff for Document Signing

This code provides dialogs, and infrastructure wrapping libxmlsec and gpgme that implements document signing.

For signing a document, a personal key pair is used, which consists of a private key and a public key, which is added to the document in addition to the digital signature of the document, when signing it.

The document signing can be done both for the source ODF/OOXML files and the exported PDF files. It is also possible to sign existing PDF files.

To test the signed PDFs, one can use the pdfverify in this way:

./bin/run pdfverify $PWD/xmlsecurity/qa/unit/pdfsigning/data/2good.pdf

The file parameter should be an absolute path.

This is the output of pdfverify for 2good.pdf:

verifying signatures
found 2 signatures
signature #0: digest match? 1
signature #0: partial? 0
signature #1: digest match? 1
signature #1: partial? 0

References