summaryrefslogtreecommitdiff
path: root/xmlsecurity/source/xmlsec/certvalidity.cxx
blob: 4c47ce9a226876d4bac27b44ca6c78769bfb45be (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
/*************************************************************************
 *
 *  $RCSfile: certvalidity.cxx,v $
 *
 *  $Revision: 1.1 $
 *
 *  last change: $Author: mmi $ $Date: 2004-08-02 04:46:57 $
 *
 *  The Contents of this file are made available subject to the terms of
 *  either of the following licenses
 *
 *         - GNU Lesser General Public License Version 2.1
 *         - Sun Industry Standards Source License Version 1.1
 *
 *  Sun Microsystems Inc., October, 2000
 *
 *  GNU Lesser General Public License Version 2.1
 *  =============================================
 *  Copyright 2000 by Sun Microsystems, Inc.
 *  901 San Antonio Road, Palo Alto, CA 94303, USA
 *
 *  This library is free software; you can redistribute it and/or
 *  modify it under the terms of the GNU Lesser General Public
 *  License version 2.1, as published by the Free Software Foundation.
 *
 *  This library is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 *  Lesser General Public License for more details.
 *
 *  You should have received a copy of the GNU Lesser General Public
 *  License along with this library; if not, write to the Free Software
 *  Foundation, Inc., 59 Temple Place, Suite 330, Boston,
 *  MA  02111-1307  USA
 *
 *
 *  Sun Industry Standards Source License Version 1.1
 *  =================================================
 *  The contents of this file are subject to the Sun Industry Standards
 *  Source License Version 1.1 (the "License"); You may not use this file
 *  except in compliance with the License. You may obtain a copy of the
 *  License at http://www.openoffice.org/license.html.
 *
 *  Software provided under this License is provided on an "AS IS" basis,
 *  WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
 *  WITHOUT LIMITATION, WARRANTIES THAT THE SOFTWARE IS FREE OF DEFECTS,
 *  MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE, OR NON-INFRINGING.
 *  See the License for the specific provisions governing your rights and
 *  obligations concerning the Software.
 *
 *  The Initial Developer of the Original Code is: Sun Microsystems, Inc.
 *
 *  Copyright: 2000 by Sun Microsystems, Inc.
 *
 *  All Rights Reserved.
 *
 *  Contributor(s): _______________________________________
 *
 *
 ************************************************************************/

#include <xmlsecurity/certvalidity.hxx>

#ifndef _COM_SUN_STAR_SECURITY_CERTIFICATEVALIDITY_HPP_
#include <com/sun/star/security/CertificateValidity.hpp>
#endif

using ::rtl::OUString ;
using ::com::sun::star::security::CertificateValidity ;

#define CERT_VALIDITY_VALID_STR "valid certificate"
#define CERT_VALIDITY_INVALID_STR "invalid certificate"
#define CERT_VALIDITY_UNTRUSTED_STR "untrusted certificate"
#define CERT_VALIDITY_TIMEOUT_STR "expired certificate"
#define CERT_VALIDITY_REVOKED_STR "revoked certificate"
#define CERT_VALIDITY_UNKNOWN_REVOKATION_STR "unknown certificate revocation status"
#define CERT_VALIDITY_SIGNATURE_INVALID_STR "invalid certificate signature"
#define CERT_VALIDITY_EXTENSION_INVALID_STR "invalid certificate extension"
#define CERT_VALIDITY_EXTENSION_UNKNOWN_STR "unknown critical certificate extension"
#define CERT_VALIDITY_ISSUER_UNKNOWN_STR "unknown certificate issuer"
#define CERT_VALIDITY_ISSUER_UNTRUSTED_STR "untrusted certificate issuer"
#define CERT_VALIDITY_ISSUER_INVALID_STR "invalid certificate issuer"
#define CERT_VALIDITY_ROOT_UNKNOWN_STR "unknown root certificate"
#define CERT_VALIDITY_ROOT_UNTRUSTED_STR "untrusted root certificate"
#define CERT_VALIDITY_ROOT_INVALID_STR "invalid root certificate"
#define CERT_VALIDITY_CHAIN_INCOMPLETE_STR "invalid certification path"

rtl::OUString certificateValidityToOUString( ::sal_Int32 certValidity ) {
    OUString aValidity ;

    if( !certValidity ) {
        aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_VALID_STR ) ;
    } else if( certValidity & CertificateValidity::CERT_VALIDITY_INVALID == CertificateValidity::CERT_VALIDITY_INVALID ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_INVALID_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_UNTRUSTED ==  CertificateValidity::CERT_VALIDITY_UNTRUSTED ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_UNTRUSTED_STR ) ;
    } else if( certValidity & CertificateValidity::CERT_VALIDITY_TIMEOUT == CertificateValidity::CERT_VALIDITY_TIMEOUT ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_TIMEOUT_STR ) ;
    } else if( certValidity & CertificateValidity::CERT_VALIDITY_REVOKED == CertificateValidity::CERT_VALIDITY_REVOKED ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_REVOKED_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_UNKNOWN_REVOKATION == CertificateValidity::CERT_VALIDITY_UNKNOWN_REVOKATION ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_UNKNOWN_REVOKATION_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_SIGNATURE_INVALID == CertificateValidity::CERT_VALIDITY_SIGNATURE_INVALID ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_SIGNATURE_INVALID_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_EXTENSION_INVALID == CertificateValidity::CERT_VALIDITY_EXTENSION_INVALID ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_EXTENSION_INVALID_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_EXTENSION_UNKNOWN == CertificateValidity::CERT_VALIDITY_EXTENSION_UNKNOWN ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_EXTENSION_UNKNOWN_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ISSUER_UNKNOWN == CertificateValidity::CERT_VALIDITY_ISSUER_UNKNOWN ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ISSUER_UNKNOWN_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ISSUER_UNTRUSTED == CertificateValidity::CERT_VALIDITY_ISSUER_UNTRUSTED ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ISSUER_UNTRUSTED_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ISSUER_INVALID == CertificateValidity::CERT_VALIDITY_ISSUER_INVALID ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ISSUER_INVALID_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ROOT_UNKNOWN == CertificateValidity::CERT_VALIDITY_ROOT_UNKNOWN ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ROOT_UNKNOWN_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ROOT_UNTRUSTED == CertificateValidity::CERT_VALIDITY_ROOT_UNTRUSTED ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ROOT_UNTRUSTED_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_ROOT_INVALID == CertificateValidity::CERT_VALIDITY_ROOT_INVALID ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_ROOT_INVALID_STR ) ;
    } else if( certValidity &  CertificateValidity::CERT_VALIDITY_CHAIN_INCOMPLETE == CertificateValidity::CERT_VALIDITY_CHAIN_INCOMPLETE ) {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_CHAIN_INCOMPLETE_STR ) ;
    } else {
         aValidity = OUString::createFromAscii( ( const char* )CERT_VALIDITY_INVALID_STR ) ;
    }

    return aValidity ;
}