office-gobmx/xmlsecurity
Stephan Bergmann 1b2fa783af -Werror,-Wdeprecated-declarations (sprintf, macOS 13 SDK): xmlsecurity
Change-Id: I58b01510fd41256660f703a3b62901fe286ffb93
Reviewed-on: https://gerrit.libreoffice.org/c/core/+/142337
Tested-by: Jenkins
Reviewed-by: Stephan Bergmann <sbergman@redhat.com>
2022-11-06 11:57:25 +01:00
..
doc
inc use more TempFileFastService in xmlsecurity 2022-10-22 08:30:55 +02:00
qa split utl::TempFile into fast and named variants 2022-09-29 09:11:18 +02:00
source -Werror,-Wdeprecated-declarations (sprintf, macOS 13 SDK): xmlsecurity 2022-11-06 11:57:25 +01:00
test_docs
uiconfig/ui gtk4: remove stray xalign 2022-01-29 20:21:09 +01:00
util Split xmlsecurity components based on the config 2022-01-03 22:49:56 +01:00
workben Move tools/diagnose_ex.h to comphelper/diagnose_ex.hxx 2022-08-18 17:10:19 +02:00
AllLangMoTarget_xsc.mk
CppunitTest_qa_certext.mk
CppunitTest_xmlsecurity_dialogs_test.mk
CppunitTest_xmlsecurity_pdfsigning.mk xmlsecurity: fix --without-system-nss usage of NSS_SetAlgorithmPolicy 2021-10-19 19:28:54 +02:00
CppunitTest_xmlsecurity_signing.mk Set EXTRA_ENV_VARS with += 2022-09-02 16:14:31 +02:00
Executable_pdfverify.mk
IwyuFilter_xmlsecurity.yaml
Library_xmlsecurity.mk Split xmlsecurity components based on the config 2022-01-03 22:49:56 +01:00
Library_xsec_xmlsec.mk Split xmlsecurity components based on the config 2022-01-03 22:49:56 +01:00
Makefile
Module_xmlsecurity.mk gbuild: build static LO / link static executables 2022-01-12 11:12:46 +01:00
README.md Add documentation for xmlsecurity 2022-02-25 23:59:56 +01:00
UIConfig_xmlsec.mk

Stuff for Document Signing

This code provides dialogs, and infrastructure wrapping libxmlsec and gpgme that implements document signing.

For signing a document, a personal key pair is used, which consists of a private key and a public key, which is added to the document in addition to the digital signature of the document, when signing it.

The document signing can be done both for the source ODF/OOXML files and the exported PDF files. It is also possible to sign existing PDF files.

To test the signed PDFs, one can use the pdfverify in this way:

./bin/run pdfverify $PWD/xmlsecurity/qa/unit/pdfsigning/data/2good.pdf

The file parameter should be an absolute path.

This is the output of pdfverify for 2good.pdf:

verifying signatures
found 2 signatures
signature #0: digest match? 1
signature #0: partial? 0
signature #1: digest match? 1
signature #1: partial? 0

References