mirror of
https://github.com/Stirling-Tools/Stirling-PDF.git
synced 2025-05-28 21:02:00 +00:00
format
This commit is contained in:
parent
0652299bec
commit
1639e0fc4c
@ -595,7 +595,9 @@ public class GetInfoOnPDF {
|
|||||||
|
|
||||||
permissionsNode.put("Document Assembly", getPermissionState(ap.canAssembleDocument()));
|
permissionsNode.put("Document Assembly", getPermissionState(ap.canAssembleDocument()));
|
||||||
permissionsNode.put("Extracting Content", getPermissionState(ap.canExtractContent()));
|
permissionsNode.put("Extracting Content", getPermissionState(ap.canExtractContent()));
|
||||||
permissionsNode.put("Extracting for accessibility", getPermissionState(ap.canExtractForAccessibility()));
|
permissionsNode.put(
|
||||||
|
"Extracting for accessibility",
|
||||||
|
getPermissionState(ap.canExtractForAccessibility()));
|
||||||
permissionsNode.put("Form Filling", getPermissionState(ap.canFillInForm()));
|
permissionsNode.put("Form Filling", getPermissionState(ap.canFillInForm()));
|
||||||
permissionsNode.put("Modifying", getPermissionState(ap.canModify()));
|
permissionsNode.put("Modifying", getPermissionState(ap.canModify()));
|
||||||
permissionsNode.put("Modifying annotations", getPermissionState(ap.canModifyAnnotations()));
|
permissionsNode.put("Modifying annotations", getPermissionState(ap.canModifyAnnotations()));
|
||||||
|
@ -92,19 +92,28 @@ public class ValidateSignatureController {
|
|||||||
SignerInformationStore signerStore = signedData.getSignerInfos();
|
SignerInformationStore signerStore = signedData.getSignerInfos();
|
||||||
|
|
||||||
for (SignerInformation signer : signerStore.getSigners()) {
|
for (SignerInformation signer : signerStore.getSigners()) {
|
||||||
X509CertificateHolder certHolder = (X509CertificateHolder) certStore.getMatches(signer.getSID()).iterator().next();
|
X509CertificateHolder certHolder =
|
||||||
X509Certificate cert = new JcaX509CertificateConverter().getCertificate(certHolder);
|
(X509CertificateHolder)
|
||||||
|
certStore.getMatches(signer.getSID()).iterator().next();
|
||||||
|
X509Certificate cert =
|
||||||
|
new JcaX509CertificateConverter().getCertificate(certHolder);
|
||||||
|
|
||||||
boolean isValid = signer.verify(new JcaSimpleSignerInfoVerifierBuilder().build(cert));
|
boolean isValid =
|
||||||
|
signer.verify(new JcaSimpleSignerInfoVerifierBuilder().build(cert));
|
||||||
result.setValid(isValid);
|
result.setValid(isValid);
|
||||||
|
|
||||||
// Additional validations
|
// Additional validations
|
||||||
result.setChainValid(customCert != null
|
result.setChainValid(
|
||||||
? certValidationService.validateCertificateChainWithCustomCert(cert, customCert)
|
customCert != null
|
||||||
|
? certValidationService
|
||||||
|
.validateCertificateChainWithCustomCert(
|
||||||
|
cert, customCert)
|
||||||
: certValidationService.validateCertificateChain(cert));
|
: certValidationService.validateCertificateChain(cert));
|
||||||
|
|
||||||
result.setTrustValid(customCert != null
|
result.setTrustValid(
|
||||||
? certValidationService.validateTrustWithCustomCert(cert, customCert)
|
customCert != null
|
||||||
|
? certValidationService.validateTrustWithCustomCert(
|
||||||
|
cert, customCert)
|
||||||
: certValidationService.validateTrustStore(cert));
|
: certValidationService.validateTrustStore(cert));
|
||||||
|
|
||||||
result.setNotRevoked(!certValidationService.isRevoked(cert));
|
result.setNotRevoked(!certValidationService.isRevoked(cert));
|
||||||
@ -126,7 +135,8 @@ public class ValidateSignatureController {
|
|||||||
|
|
||||||
// Get key size (if possible)
|
// Get key size (if possible)
|
||||||
try {
|
try {
|
||||||
result.setKeySize(((RSAPublicKey) cert.getPublicKey()).getModulus().bitLength());
|
result.setKeySize(
|
||||||
|
((RSAPublicKey) cert.getPublicKey()).getModulus().bitLength());
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
// If not RSA or error, set to 0
|
// If not RSA or error, set to 0
|
||||||
result.setKeySize(0);
|
result.setKeySize(0);
|
||||||
@ -152,7 +162,9 @@ public class ValidateSignatureController {
|
|||||||
result.setKeyUsages(keyUsages);
|
result.setKeyUsages(keyUsages);
|
||||||
|
|
||||||
// Check if self-signed
|
// Check if self-signed
|
||||||
result.setSelfSigned(cert.getSubjectX500Principal().equals(cert.getIssuerX500Principal()));
|
result.setSelfSigned(
|
||||||
|
cert.getSubjectX500Principal()
|
||||||
|
.equals(cert.getIssuerX500Principal()));
|
||||||
}
|
}
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
result.setValid(false);
|
result.setValid(false);
|
||||||
|
@ -27,5 +27,4 @@ public class SignatureValidationResult {
|
|||||||
private String version; // Certificate version
|
private String version; // Certificate version
|
||||||
private List<String> keyUsages; // List of key usage purposes
|
private List<String> keyUsages; // List of key usage purposes
|
||||||
private boolean isSelfSigned; // Whether the certificate is self-signed
|
private boolean isSelfSigned; // Whether the certificate is self-signed
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,5 @@
|
|||||||
package stirling.software.SPDF.service;
|
package stirling.software.SPDF.service;
|
||||||
|
|
||||||
import io.github.pixee.security.BoundedLineReader;
|
|
||||||
import java.io.BufferedReader;
|
import java.io.BufferedReader;
|
||||||
import java.io.ByteArrayInputStream;
|
import java.io.ByteArrayInputStream;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
@ -24,6 +23,8 @@ import java.util.Set;
|
|||||||
|
|
||||||
import org.springframework.stereotype.Service;
|
import org.springframework.stereotype.Service;
|
||||||
|
|
||||||
|
import io.github.pixee.security.BoundedLineReader;
|
||||||
|
|
||||||
import jakarta.annotation.PostConstruct;
|
import jakarta.annotation.PostConstruct;
|
||||||
|
|
||||||
@Service
|
@Service
|
||||||
|
Loading…
x
Reference in New Issue
Block a user