mirror of
https://github.com/unidoc/unioffice.git
synced 2025-04-29 13:49:10 +08:00

These are implied values as they are the defaults in the XSD for optional attributes/elements. However I've noticed that I keep running into issues where Mac Excel/Word fail to open a file unless an optional default is provided. I'll just add them all to hopefully increase compatibility and save painful file format debugging sessions later.
283 lines
8.5 KiB
Go
283 lines
8.5 KiB
Go
// Copyright 2017 Baliance. All rights reserved.
|
|
//
|
|
// Use of this source code is governed by the terms of the Affero GNU General
|
|
// Public License version 3.0 as published by the Free Software Foundation and
|
|
// appearing in the file LICENSE included in the packaging of this file. A
|
|
// commercial license can be purchased by contacting sales@baliance.com.
|
|
|
|
package presentationml
|
|
|
|
import (
|
|
"encoding/xml"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"baliance.com/gooxml/schema/schemas.openxmlformats.org/officeDocument/2006/sharedTypes"
|
|
)
|
|
|
|
type CT_ModifyVerifier struct {
|
|
// Cryptographic Algorithm Name
|
|
AlgorithmNameAttr *string
|
|
// Password Hash Value
|
|
HashValueAttr *string
|
|
// Salt Value for Password Verifier
|
|
SaltValueAttr *string
|
|
// Iterations to Run Hashing Algorithm
|
|
SpinValueAttr *uint32
|
|
// Cryptographic Provider Type
|
|
CryptProviderTypeAttr sharedTypes.ST_CryptProv
|
|
// Cryptographic Algorithm Class
|
|
CryptAlgorithmClassAttr sharedTypes.ST_AlgClass
|
|
// Cryptographic Algorithm Type
|
|
CryptAlgorithmTypeAttr sharedTypes.ST_AlgType
|
|
// Cryptographic Hashing Algorithm
|
|
CryptAlgorithmSidAttr *uint32
|
|
// Iterations to Run Hashing Algorithm
|
|
SpinCountAttr *uint32
|
|
// Salt for Password Verifier
|
|
SaltDataAttr *string
|
|
// Password Hash
|
|
HashDataAttr *string
|
|
// Cryptographic Provider
|
|
CryptProviderAttr *string
|
|
// Cryptographic Algorithm Extensibility
|
|
AlgIdExtAttr *uint32
|
|
// Algorithm Extensibility Source
|
|
AlgIdExtSourceAttr *string
|
|
// Cryptographic Provider Type Extensibility
|
|
CryptProviderTypeExtAttr *uint32
|
|
// Provider Type Extensibility Source
|
|
CryptProviderTypeExtSourceAttr *string
|
|
}
|
|
|
|
func NewCT_ModifyVerifier() *CT_ModifyVerifier {
|
|
ret := &CT_ModifyVerifier{}
|
|
ret.CryptProviderTypeAttr = sharedTypes.ST_CryptProv(1)
|
|
ret.CryptAlgorithmClassAttr = sharedTypes.ST_AlgClass(1)
|
|
ret.CryptAlgorithmTypeAttr = sharedTypes.ST_AlgType(1)
|
|
return ret
|
|
}
|
|
|
|
func (m *CT_ModifyVerifier) MarshalXML(e *xml.Encoder, start xml.StartElement) error {
|
|
if m.AlgorithmNameAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "algorithmName"},
|
|
Value: fmt.Sprintf("%v", *m.AlgorithmNameAttr)})
|
|
}
|
|
if m.HashValueAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "hashValue"},
|
|
Value: fmt.Sprintf("%v", *m.HashValueAttr)})
|
|
}
|
|
if m.SaltValueAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "saltValue"},
|
|
Value: fmt.Sprintf("%v", *m.SaltValueAttr)})
|
|
}
|
|
if m.SpinValueAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "spinValue"},
|
|
Value: fmt.Sprintf("%v", *m.SpinValueAttr)})
|
|
}
|
|
if m.CryptProviderTypeAttr != sharedTypes.ST_CryptProvUnset {
|
|
attr, err := m.CryptProviderTypeAttr.MarshalXMLAttr(xml.Name{Local: "cryptProviderType"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmClassAttr != sharedTypes.ST_AlgClassUnset {
|
|
attr, err := m.CryptAlgorithmClassAttr.MarshalXMLAttr(xml.Name{Local: "cryptAlgorithmClass"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmTypeAttr != sharedTypes.ST_AlgTypeUnset {
|
|
attr, err := m.CryptAlgorithmTypeAttr.MarshalXMLAttr(xml.Name{Local: "cryptAlgorithmType"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmSidAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "cryptAlgorithmSid"},
|
|
Value: fmt.Sprintf("%v", *m.CryptAlgorithmSidAttr)})
|
|
}
|
|
if m.SpinCountAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "spinCount"},
|
|
Value: fmt.Sprintf("%v", *m.SpinCountAttr)})
|
|
}
|
|
if m.SaltDataAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "saltData"},
|
|
Value: fmt.Sprintf("%v", *m.SaltDataAttr)})
|
|
}
|
|
if m.HashDataAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "hashData"},
|
|
Value: fmt.Sprintf("%v", *m.HashDataAttr)})
|
|
}
|
|
if m.CryptProviderAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "cryptProvider"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderAttr)})
|
|
}
|
|
if m.AlgIdExtAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "algIdExt"},
|
|
Value: fmt.Sprintf("%v", *m.AlgIdExtAttr)})
|
|
}
|
|
if m.AlgIdExtSourceAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "algIdExtSource"},
|
|
Value: fmt.Sprintf("%v", *m.AlgIdExtSourceAttr)})
|
|
}
|
|
if m.CryptProviderTypeExtAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "cryptProviderTypeExt"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderTypeExtAttr)})
|
|
}
|
|
if m.CryptProviderTypeExtSourceAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "cryptProviderTypeExtSource"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderTypeExtSourceAttr)})
|
|
}
|
|
e.EncodeToken(start)
|
|
e.EncodeToken(xml.EndElement{Name: start.Name})
|
|
return nil
|
|
}
|
|
|
|
func (m *CT_ModifyVerifier) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {
|
|
// initialize to default
|
|
m.CryptProviderTypeAttr = sharedTypes.ST_CryptProv(1)
|
|
m.CryptAlgorithmClassAttr = sharedTypes.ST_AlgClass(1)
|
|
m.CryptAlgorithmTypeAttr = sharedTypes.ST_AlgType(1)
|
|
for _, attr := range start.Attr {
|
|
if attr.Name.Local == "algorithmName" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.AlgorithmNameAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "hashValue" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.HashValueAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "saltValue" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.SaltValueAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "spinValue" {
|
|
parsed, err := strconv.ParseUint(attr.Value, 10, 32)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pt := uint32(parsed)
|
|
m.SpinValueAttr = &pt
|
|
}
|
|
if attr.Name.Local == "cryptProviderType" {
|
|
m.CryptProviderTypeAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmClass" {
|
|
m.CryptAlgorithmClassAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmType" {
|
|
m.CryptAlgorithmTypeAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmSid" {
|
|
parsed, err := strconv.ParseUint(attr.Value, 10, 32)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pt := uint32(parsed)
|
|
m.CryptAlgorithmSidAttr = &pt
|
|
}
|
|
if attr.Name.Local == "spinCount" {
|
|
parsed, err := strconv.ParseUint(attr.Value, 10, 32)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pt := uint32(parsed)
|
|
m.SpinCountAttr = &pt
|
|
}
|
|
if attr.Name.Local == "saltData" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.SaltDataAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "hashData" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.HashDataAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProvider" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptProviderAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "algIdExt" {
|
|
parsed, err := strconv.ParseUint(attr.Value, 10, 32)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pt := uint32(parsed)
|
|
m.AlgIdExtAttr = &pt
|
|
}
|
|
if attr.Name.Local == "algIdExtSource" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.AlgIdExtSourceAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProviderTypeExt" {
|
|
parsed, err := strconv.ParseUint(attr.Value, 10, 32)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
pt := uint32(parsed)
|
|
m.CryptProviderTypeExtAttr = &pt
|
|
}
|
|
if attr.Name.Local == "cryptProviderTypeExtSource" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptProviderTypeExtSourceAttr = &parsed
|
|
}
|
|
}
|
|
// skip any extensions we may find, but don't support
|
|
for {
|
|
tok, err := d.Token()
|
|
if err != nil {
|
|
return fmt.Errorf("parsing CT_ModifyVerifier: %s", err)
|
|
}
|
|
if el, ok := tok.(xml.EndElement); ok && el.Name == start.Name {
|
|
break
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Validate validates the CT_ModifyVerifier and its children
|
|
func (m *CT_ModifyVerifier) Validate() error {
|
|
return m.ValidateWithPath("CT_ModifyVerifier")
|
|
}
|
|
|
|
// ValidateWithPath validates the CT_ModifyVerifier and its children, prefixing error messages with path
|
|
func (m *CT_ModifyVerifier) ValidateWithPath(path string) error {
|
|
if err := m.CryptProviderTypeAttr.ValidateWithPath(path + "/CryptProviderTypeAttr"); err != nil {
|
|
return err
|
|
}
|
|
if err := m.CryptAlgorithmClassAttr.ValidateWithPath(path + "/CryptAlgorithmClassAttr"); err != nil {
|
|
return err
|
|
}
|
|
if err := m.CryptAlgorithmTypeAttr.ValidateWithPath(path + "/CryptAlgorithmTypeAttr"); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|