diff options
author | Miklos Vajna <vmiklos@collabora.com> | 2019-05-14 22:53:34 +0200 |
---|---|---|
committer | Miklos Vajna <vmiklos@collabora.com> | 2019-05-15 09:04:41 +0200 |
commit | 7661e356c42e30bf4e2c2842c663f1c3a5ffebc2 (patch) | |
tree | fd033331a34b8a0efd1c7aed3dcd9cd50c4186c1 /xmlsecurity/qa | |
parent | 8acc15b5113c798ecdbeed91456a92e7b0c1334e (diff) |
xmlsecurity: make DocumentSignatureManager members private
Change-Id: I1262ca0dc2b2f843bdd6277415ee7967e9e59458
Reviewed-on: https://gerrit.libreoffice.org/72320
Tested-by: Jenkins
Reviewed-by: Miklos Vajna <vmiklos@collabora.com>
Diffstat (limited to 'xmlsecurity/qa')
-rw-r--r-- | xmlsecurity/qa/unit/pdfsigning/pdfsigning.cxx | 14 | ||||
-rw-r--r-- | xmlsecurity/qa/unit/signing/signing.cxx | 54 |
2 files changed, 34 insertions, 34 deletions
diff --git a/xmlsecurity/qa/unit/pdfsigning/pdfsigning.cxx b/xmlsecurity/qa/unit/pdfsigning/pdfsigning.cxx index d04f8a675669..97e0b7d28f97 100644 --- a/xmlsecurity/qa/unit/pdfsigning/pdfsigning.cxx +++ b/xmlsecurity/qa/unit/pdfsigning/pdfsigning.cxx @@ -285,9 +285,9 @@ CPPUNIT_TEST_FIXTURE(PDFSigningTest, testPDFRemoveAll) std::unique_ptr<SvStream> pStream = utl::UcbStreamHelper::CreateStream(aOutURL, StreamMode::READ | StreamMode::WRITE); uno::Reference<io::XStream> xStream(new utl::OStreamWrapper(std::move(pStream))); - aManager.mxSignatureStream = xStream; + aManager.setSignatureStream(xStream); aManager.read(/*bUseTempStream=*/false); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); // This was 1 when NSS_CMSSignerInfo_GetSigningCertificate() failed, which // means that we only used the locally imported certificates for // verification, not the ones provided in the PDF signature data. @@ -315,12 +315,12 @@ CPPUNIT_TEST_FIXTURE(PDFSigningTest, testTdf107782) std::unique_ptr<SvStream> pStream = utl::UcbStreamHelper::CreateStream(aURL, StreamMode::READ | StreamMode::WRITE); uno::Reference<io::XStream> xStream(new utl::OStreamWrapper(std::move(pStream))); - aManager.mxSignatureStream = xStream; + aManager.setSignatureStream(xStream); aManager.read(/*bUseTempStream=*/false); - CPPUNIT_ASSERT(aManager.mpPDFSignatureHelper); + CPPUNIT_ASSERT(aManager.hasPDFSignatureHelper()); // This failed with an std::bad_alloc exception on Windows. - aManager.mpPDFSignatureHelper->GetDocumentSignatureInformations( + aManager.getPDFSignatureHelper().GetDocumentSignatureInformations( aManager.getSecurityEnvironment()); } @@ -486,11 +486,11 @@ CPPUNIT_TEST_FIXTURE(PDFSigningTest, testUnknownSubFilter) m_directories.getURLFromSrc(DATA_DIRECTORY) + "cr-comment.pdf", StreamMode::STD_READ); uno::Reference<io::XStream> xStream(new utl::OStreamWrapper(std::move(pStream))); DocumentSignatureManager aManager(mxComponentContext, DocumentSignatureMode::Content); - aManager.mxSignatureStream = xStream; + aManager.setSignatureStream(xStream); aManager.read(/*bUseTempStream=*/false); // Make sure we find both signatures, even if the second has unknown SubFilter. - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(2), rInformations.size()); } diff --git a/xmlsecurity/qa/unit/signing/signing.cxx b/xmlsecurity/qa/unit/signing/signing.cxx index f16398aabed0..19d233063ad7 100644 --- a/xmlsecurity/qa/unit/signing/signing.cxx +++ b/xmlsecurity/qa/unit/signing/signing.cxx @@ -209,8 +209,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testDescription) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); // Then add a signature document. uno::Reference<security::XCertificate> xCertificate @@ -223,7 +223,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testDescription) // Read back the signature and make sure that the description survives the roundtrip. aManager.read(/*bUseTempStream=*/true); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); CPPUNIT_ASSERT_EQUAL(aDescription, rInformations[0].ouDescription); } @@ -246,8 +246,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSA) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); // Then add a signature. uno::Reference<security::XCertificate> xCertificate @@ -260,7 +260,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSA) // Read back the signature and make sure that it's valid. aManager.read(/*bUseTempStream=*/true); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); // This was SecurityOperationStatus_UNKNOWN, signing with an ECDSA key was // broken. @@ -286,8 +286,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAOOXML) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); // Then add a document signature. uno::Reference<security::XCertificate> xCertificate @@ -301,7 +301,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAOOXML) // Read back the signature and make sure that it's valid. aManager.read(/*bUseTempStream=*/true); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); // This was SecurityOperationStatus_UNKNOWN, signing with an ECDSA key was // broken. @@ -328,7 +328,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAPDF) aTempFile.GetURL(), StreamMode::READ | StreamMode::WRITE)); uno::Reference<io::XStream> xStream(new utl::OStreamWrapper(*pStream)); CPPUNIT_ASSERT(xStream.is()); - aManager.mxSignatureStream = xStream; + aManager.setSignatureStream(xStream); // Then add a document signature. uno::Reference<security::XCertificate> xCertificate @@ -342,7 +342,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAPDF) // Read back the signature and make sure that it's valid. aManager.read(/*bUseTempStream=*/false); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); // This was SecurityOperationStatus_UNKNOWN, signing with an ECDSA key was // broken. @@ -368,8 +368,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLDescription) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); // Then add a document signature. uno::Reference<security::XCertificate> xCertificate @@ -382,7 +382,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLDescription) // Read back the signature and make sure that the description survives the roundtrip. aManager.read(/*bUseTempStream=*/true); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); CPPUNIT_ASSERT_EQUAL(aDescription, rInformations[0].ouDescription); } @@ -404,10 +404,10 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLAppend) = comphelper::OStorageHelper::GetStorageOfFormatFromURL(ZIP_STORAGE_FORMAT_STRING, aURL, embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); aManager.read(/*bUseTempStream=*/false); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); // Then add a second document signature. @@ -440,10 +440,10 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLRemove) = comphelper::OStorageHelper::GetStorageOfFormatFromURL(ZIP_STORAGE_FORMAT_STRING, aURL, embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); aManager.read(/*bUseTempStream=*/false); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(2), rInformations.size()); // Then remove the last added signature. @@ -476,10 +476,10 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLRemoveAll) = comphelper::OStorageHelper::GetStorageOfFormatFromURL(ZIP_STORAGE_FORMAT_STRING, aURL, embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); aManager.read(/*bUseTempStream=*/false); - std::vector<SignatureInformation>& rInformations = aManager.maCurrentSignatureInformations; + std::vector<SignatureInformation>& rInformations = aManager.getCurrentSignatureInformations(); CPPUNIT_ASSERT_EQUAL(static_cast<std::size_t>(1), rInformations.size()); // Then remove the only signature in the document. @@ -714,8 +714,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testXAdESNotype) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); aManager.read(/*bUseTempStream=*/false); // Create a new signature. @@ -775,8 +775,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testXAdES) = comphelper::OStorageHelper::GetStorageOfFormatFromURL( ZIP_STORAGE_FORMAT_STRING, aTempFile.GetURL(), embed::ElementModes::READWRITE); CPPUNIT_ASSERT(xStorage.is()); - aManager.mxStore = xStorage; - aManager.maSignatureHelper.SetStorage(xStorage, "1.2"); + aManager.setStore(xStorage); + aManager.getSignatureHelper().SetStorage(xStorage, "1.2"); // Create a signature. uno::Reference<security::XCertificate> xCertificate |