aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--eidas_modules/authmodule-eIDAS-v2/pom.xml25
-rw-r--r--licenses/IAIK-LICENSE.txt108
-rw-r--r--licenses/SIC_LICENSE.txt197
-rw-r--r--pom.xml2
4 files changed, 9 insertions, 323 deletions
diff --git a/eidas_modules/authmodule-eIDAS-v2/pom.xml b/eidas_modules/authmodule-eIDAS-v2/pom.xml
index 6b5469a1..976a4d9b 100644
--- a/eidas_modules/authmodule-eIDAS-v2/pom.xml
+++ b/eidas_modules/authmodule-eIDAS-v2/pom.xml
@@ -59,15 +59,6 @@
<artifactId>eaaf_module_pvp2_sp</artifactId>
</dependency>
- <dependency>
- <groupId>iaik.prod</groupId>
- <artifactId>iaik_jce_full</artifactId>
- <version>5.52_moa</version>
-<!-- <groupId>iaik</groupId>-->
-<!-- <artifactId>jce_full_signed</artifactId>-->
-<!-- <version>5.52</version>-->
- </dependency>
-
<!-- eIDAS reference implemenation libs -->
<dependency>
<groupId>eu.eidas</groupId>
@@ -181,12 +172,12 @@
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-test</artifactId>
<scope>test</scope>
- </dependency>
+ </dependency>
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-tomcat</artifactId>
<scope>test</scope>
- </dependency>
+ </dependency>
<dependency>
<groupId>com.github.skjolber</groupId>
<artifactId>mockito-soap-cxf</artifactId>
@@ -283,15 +274,15 @@
<extraargs>
<extraarg>-verbose </extraarg>
</extraargs>
- </wsdlOption>
+ </wsdlOption>
<wsdlOption>
<wsdl>${basedir}/src/main/resources/wsdl/zmr_client/wsdl/Service.wsdl</wsdl>
<extraargs>
<extraarg>-verbose </extraarg>
</extraargs>
</wsdlOption>
-
- <!--use custom package name for search address Web-Service,
+
+ <!--use custom package name for search address Web-Service,
because ZMR and address Web-Service use the same XML namespace but defines different schema. -->
<wsdlOption>
<wsdl>${basedir}/src/main/resources/wsdl/addresssearching_client/wsdl/Service.wsdl</wsdl>
@@ -300,10 +291,10 @@
</extraargs>
<packagenames>
<packagename>http://bmi.gv.at/namespace/zmr-su/base/20040201#=at.gv.bmi.namespace.zmr_su.base._20040201_.address</packagename>
- <packagename>http://bmi.gv.at/namespace/zmr-su/zmr/20040201#=at.gv.bmi.namespace.zmr_su.zrm._20040201_.address</packagename>
+ <packagename>http://bmi.gv.at/namespace/zmr-su/zmr/20040201#=at.gv.bmi.namespace.zmr_su.zrm._20040201_.address</packagename>
</packagenames>
- </wsdlOption>
-
+ </wsdlOption>
+
</wsdlOptions>
</configuration>
<goals>
diff --git a/licenses/IAIK-LICENSE.txt b/licenses/IAIK-LICENSE.txt
deleted file mode 100644
index 4fa412cf..00000000
--- a/licenses/IAIK-LICENSE.txt
+++ /dev/null
@@ -1,108 +0,0 @@
-Stiftung SIC License Agreement for "IAIK MOA"
-
-Valid from December 1st, 2005
-
-The Stiftung SIC
-Stiftung Secure Information and Communication Technologies
-Inffeldgasse16a, A-8010 Graz, Austria, hereafter referred to as "Stiftung SIC",
-offers to grant licences for the SOFTWARE defined below according to the following conditions:
-
-1. DEFINITIONS
-For the purpose of this Licence Agreement, the following definitions are valid:
-
-a. The term "SOFTWARE" refers to the "IAIK MOA" bundle in any
-form (object code or other) including documentation. The
-SOFTWARE is the sole property of Stiftung SIC and protected by
-Austrian, International Copyright Law, e.g. the Revised Berne
-Convention, and the US Copyright Act.
-
-b. "IAIK MOA" is distributed in documentation, manuals, and user
-guides, tools - including any revisions, patches and updates
-downloaded by the customer.
-
-c."IAIK MOA Runtime Modules" means the runtime object code
-modules provided with, or derived from the SOFTWARE.
-
-d. "MOA modules" mean the modules for online applications made
-available by the Austrian Federal Chancellery and they consist of
-MOA-Signature Creation (MOA-SS), MOA-Signature Verification
-(MOA-SP) and MOA-Identification (MOA-ID).
-
-2. GRANTING of LICENCES
-
-The licensee is granted as specified below:
-
-o IAIK MOA Runtime License
-Stiftung SIC grants the Licensee a non-exclusive, non-transferable runtime licence to use the
-"IAIK MOA" modules in the context of unmodified MOA modules. Any attempt to use any parts or
-the whole IAIK Crypto Toolkits which come bundled together with the MOA modules for any
-purpose other than accessing these MOA modules by applications, including, but not limited to,
-the development of applications, the creation of a toolkit, or inclusion in a different toolkit, is not
-permitted without additional licenses. These licences are not transferable to contractors or any
-other persons, organisations or companies outside the licensee's organisation without making
-such persons, organisations or companies explicitly aware of the restrictions of these licenses
-and such persons, organisations or companies explicitly agree to observe these restrictions.
-
-3. LIMITATIONS for all LICENCES:
-LICENSEES must not attempt to reverse engineer, decompile, disassemble, reverse, translate or in
-any other manner decode the computer programmes in the IAIK libraries in order to derive the
-source code there from.
-
-4. WARRANTY:
-Stiftung SIC guarantees that the SOFTWARE is free of any computer virus or other malicious
-hidden routines that would intentionally cause damage to or corrupt data, storage media or
-equipment. For proving the integrity of the SOFTWARE, Stiftung SIC may calculate a SHA-1 hash
-value over the distribution file and publish it on its web site. It is the duty of the licensee to verify this
-hash value. If the hash value cannot be verified, Stiftung SIC declines any warranties on that
-software, and the licensee should immediately (or within 30 days of delivery at the latest), contact
-Stiftung SIC for verification and reshipment.
-The SOFTWARE is provided "as is" and except for the declaration and warranty stated in this
-section, Stiftung SIC makes no representations, conditions or warranties, either express or implied,
-relative to the SOFTWARE or services provided hereunder, including all implied conditions or
-warranties of merchantability and fitness for a particular purpose and all conditions with respect to
-intellectual property infringement. Stiftung SIC may, but shall not be obliged to, fix errors in any
-SOFTWARE.
-
-5. PROPRIETARY INFORMATION and CONFIDENTIALITY:
-The LICENSEE acknowledges that the SOFTWARE remains the property of, and is confidential to,
-Stiftung SIC and incorporates trade secrets of Stiftung SIC, and that Stiftung SIC shall have the
-exclusive right to any copyrights or patents in respect of the SOFTWARE. The LICENSEE agrees to
-maintain the confidentiality of the SOFTWARE.
-The LICENSEE further agrees that (with the exception of paragraph 2 above), he shall not make
-any disclosure of the SOFTWARE (including copies thereof or methods or concepts utilised therein)
-to any person or entity, other than employees of the LICENSEE, to whom such disclosure is
-necessary in order to use the SOFTWARE as provided herein. The LICENSEE shall appropriately
-notify each employee to whom any such disclosure is made. Such disclosure must be made in
-confidence and shall be kept in confidence by the employee in question.
-The LICENSEE agrees to use diligent and determined efforts to secure and protect the
-SOFTWARE and copies thereof in a manner consistent with their proprietary character and the
-maintenance of Licensor's rights therein, and without limitation thereof, to take appropriate action,
-by instruction or agreement with its employees who are permitted access to the SOFTWARE or
-copies thereof, or otherwise, to satisfy its obligations as hereby stated.
-
-6. TERMINATION:
-Stiftung SIC may terminate this Agreement without prior notice, if the licensee 1. neglects or fails to
-perform or observe, or correct a breach of its obligations to Stiftung SIC; 2. goes out of business,
-files a bankruptcy petition or has such a petition filed involuntarily against it or becomes insolvent; 3.
-develops, sells, licenses or distributes or attempts to develop, sell, license or distribute any software
-based on the SOFTWARE which is outside the scope of the limited rights granted herein, to any
-third party. In the event of such a termination, the Licensee shall immediately destroy all copies and
-ensure that all backup copies are destroyed as well.
-
-Stiftung SIC may at any time stop granting free licenses of the SOFTWARE in combination with the
-MOA modules without prior notice. In this case, all licenses granted until that time remain valid, i.e.
-allow the licensee to continue using the SOFTWARE in combination with the unmodified MOA
-modules.
-
-7. LIABILITY:
-To the maximum extent allowed by applicable law Stiftung SIC shall not be liable for any damages
-whatsoever (including, without limitation, damages for loss of business profits, business interruption,
-loss of business information, or other pecuniary loss) arising out of the use of or inability to use the
-SOFTWARE, even if Stiftung SIC has been advised of the possibility of such damages.
-
-8. WAIVER:
-Invalidity, on legal grounds, of any term of this Agreement does not render the Agreement as a whole
-invalid.
-
-9. GOVERNING LAW, ARBITRATION:
-This Agreement is governed by Austrian law.
diff --git a/licenses/SIC_LICENSE.txt b/licenses/SIC_LICENSE.txt
deleted file mode 100644
index 5452d915..00000000
--- a/licenses/SIC_LICENSE.txt
+++ /dev/null
@@ -1,197 +0,0 @@
-License for Open Source Projects
-
-Stiftung SIC Java Crypto-Software Development Kit Licence Agreement for
-Free Licenses Valid from February 19, 2010, amended May 13, 2011
-
-The Stiftung SIC (Stiftung Secure Information and Communication
-Technologies, Inffeldgasse16a, A-8010 Graz, Austria / Europe) hereafter
-referred to as "Stiftung SIC" offers to grant licences for the SOFTWARE
-defined below according to the following conditions:
-
-1. DEFINITIONS
-
-a. "LICENSEE" refers to the person, organisation or company, to whom the
-licenses are granted under this license agreement.
-
-b. The term "SOFTWARE" refers to IAIK Java Crypto Software in any form
-(source code, object code or other) including documentation. The
-SOFTWARE is the sole property of Stiftung SIC and protected by Austrian,
-International Copyright Law, e.g. the Revised Berne Convention, and the
-US Copyright Act.
-
-c. "IAIK Java Crypto Software" means either IAIK-JCE, iSaSiLk or any
-other Java-based Crypto-Software development kit which usually consists
-of source code (if applicable; for source licences only), Java byte code
-or any other form of object code. The Software and additional tools are
-distributed in documentation, manuals, user guides, sample application
-code, tools - including any revisions, patches and updates delivered or
-downloaded by the LICENSEE.
-
-d. "IAIK Java Crypto Software Runtime Modules" means the runtime object
-code modules provided with, or derived from, an IAIK-Java-Crypto
-Software Development Kit, which are usually distributed as a
-Java-Archive in JAR or ZIP-Format, or in any other format suitable for
-use by application programmes or other software.
-
-e. "IAIK-Crypto Software based Application" means any computer programme
-created by the LICENSEE using any of the IAIK-Toolkits, with the
-exception of server software, which is considered as a different
-category.
-
-f. "Server software" means IAIK-Crypto Software based applications run
-or published on a server (like but not limited to a web server).
-Examples for server software are applets, midlets, servlets, CGI-scripts
-or software that is run on a server.
-
-g. "To publish" means that an application is retrievable or accessible
-from a certain server, but not installed on another machine.
-
-h. "DERIVED SOFTWARE" refers to software (excluding any of our SOFTWARE)
-in any form (source code, object code or other) that uses the IAIK Java
-Crypto Software Runtime Modules. It also includes parts where LICENSEE
-acts as a licensor or sub-licensor.
-
-i. “Open Source Software Development” means development under an
-ACCEPTED LICENSE.
-
-j. "ACCEPTED LICENSE" means the following licenses:
-
-j1. GPL Version 2, June 1991 (http: //www.fsf.org/licenses/gpl.html).
-
-j2. European Union Public License (EUPL) Version 1.1, January 2009
-(http://www.osor.eu/eupl) - for distribution under compatible licenses
-defined in the licenses above or under any other license, the LICENSEE
-needs explicit permission by Stiftung SIC.
-
-2. GRANTING of LICENCES Stiftung SIC grants free licenses of the
-SOFTWARE for development of free of charge open source software. The
-SOFTWARE may be distributed bundled with the free of charge open source
-software in binary form only. The type of open source development is
-generally unrestricted; the only exception is a product that contains or
-is an API or a service of which most of the functionality is provided by
-the SOFTWARE. The derived product must not offer features that are
-similar to that of the SOFTWARE. This means, this license does not allow
-developing a product that contains or is a wrapper around the SOFTWARE.
-
-The LICENSEE and his licensees are granted a non-exclusive,
-non-transferable license to run and redistribute the IAIK Java Crypto
-Software Runtime Modules in unmodified, binary form under the following
-conditions.
-
- * The LICENSEE and his licensees are not permitted to charge any
- royalties or fees for DERIVED SOFTWARE.
-
- * The LICENSEE of "IAIK Java Crypto Software Runtime Modules", has to
- make the source code of his product publicly available under an
- ACCEPTED LICENSE.
-
- * The LICENSEE is further hereby obliged and authorized to bind his
- licensees to all these conditions.
-
-If LICENSEE licenses DERIVED SOFTWARE under any other free software
-licensing scheme that is similar to an ACCEPTED LICENSE, it may be
-possible to grant a free license. Stiftung SIC will decide on this
-individually after inspecting the intended use and license conditions.
-
-This free license shall NOT be construed or otherwise interpreted as any
-kind of express or implied representation that this SOFTWARE is
-licensable under an ACCEPTED LICENSE or any free license other than the
-one laid out in this document.
-
-3. LIMITATIONS for all LICENCES: LICENSEES must not attempt to reverse
-engineer, decompile, disassemble, reverse, translate or in any other
-manner decode the computer programmes in the IAIK-Toolkit in order to
-derive the source code there from.
-
-ATTENTION: THIS LICENSE AGREEMENT DOES NOT INCLUDE LICENSING OF THE
-INCLUDED ALGORITHMS, when appropriate. Please see
-http://jce.iaik.tugraz.at/sic/sales/patent_issues_algorithms for a
-summary of the licence/patent status situation of algorithms used in
-IAIK-JCE. It is the sole responsibility of LICENSEES to ensure the
-legality of using the IAIK-Crypto software in their countries. Stiftung
-SIC declares that to the best of its knowledge all parts of the
-IAIK-Toolkits have been developed by Austrian citizens, except for the
-HTTP implementation (w3c_http.jar) delivered with the iSaSiLk
-distribution and free third party libraries (like Apache Xalan or
-Xerces) that may be delivered with the toolkits for convenience. The
-implementation of the Camellia cipher algorithm core has been provided
-by NTT (Nippon Telegraph and Telephone Corporation) under BSD licence
-terms
-(see http://jce.iaik.tugraz.at/sic/sales/patent_issues_algorithms).
-
-4. TERMS of LICENSE: Free licenses for development of free of charge
-open source software under ACCEPTED LICENSES are perpetual. Stiftung SIC
-has no obligation to continue making free updates or new versions
-available for LICENSEE
-
-5. DELIVERY: Free licenses are made available by download only.
-
-6. WARRANTY: Stiftung SIC guarantees that the SOFTWARE is free of any
-computer virus or other malicious hidden routines that would
-intentionally cause damage to or corrupt data, storage media or
-equipment.
-
-The SOFTWARE is provided "as is" and except for the declaration and
-warranty stated in this Section, Stiftung SIC makes no representations,
-conditions or warranties, either express or implied, relative to the
-IAIK-Toolkit or services provided hereunder, including all implied
-conditions or warranties of merchantability and fitness for a particular
-purpose and all conditions with respect to intellectual property
-infringement.
-
-7. PROPRIETARY INFORMATION and CONFIDENTIALITY: The LICENSEE
-acknowledges that the SOFTWARE remains the property of, and is
-confidential to, Stiftung SIC and incorporates trade secrets of Stiftung
-SIC, and that Stiftung SIC shall have the exclusive right to any
-copyrights or patents in respect of the SOFTWARE. The LICENSEE agrees to
-maintain the confidentiality of the SOFTWARE. The LICENSEE further
-agrees that (with the exception of paragraph 2 above), he shall not make
-any disclosure of the SOFTWARE (including copies thereof or methods or
-concepts utilised therein) to any person or entity, other than employees
-of the LICENSEE, to whom such disclosure is necessary in order to use
-the SOFTWARE as provided herein. The LICENSEE shall appropriately notify
-each employee to whom any such disclosure is made. Such disclosure must
-be made in confidence and shall be kept in confidence by the employee in
-question. The LICENSEE agrees to use diligent and determined efforts to
-secure and protect the SOFTWARE and copies thereof in a manner
-consistent with their proprietary character and the maintenance of
-LICENSOR`s rights therein, and without limitation thereof, to take
-appropriate action, by instruction or agreement with its employees who
-are permitted access to the SOFTWARE or copies thereof, or otherwise, to
-satisfy its obligations as hereby stated.
-
-8. TERMINATION: Stiftung SIC may terminate this Agreement without prior
-notice, if the LICENSEE 1. neglects or fails to perform or observe, or
-correct a breach of its obligations to Stiftung SIC; 2. goes out of
-business, files a bankruptcy petition or has such a petition filed
-involuntarily against it or becomes insolvent; 3. develops, sells,
-licenses or distributes or attempts to develop, sell, license or
-distribute any software based on the IAIK-Toolkit which is outside the
-scope of the limited rights granted herein, to any third party. In the
-event of such a termination, the LICENSEE shall immediately delete all
-electronic versions from his systems and ensure that all backup copies
-are destroyed as well.
-
-9. LIABILITY: To the maximum extent allowed by applicable law Stiftung
-SIC shall not be liable for any damages whatsoever (including, without
-limitation, damages for loss of business profits, business interruption,
-loss of business information, or other pecuniary loss) arising out of
-the use of or inability to use the IAIK-Toolkit, even if Stiftung SIC
-has been advised of the possibility of such damages.
-
-10. EXPORT RESTRICTIONS: In some countries, the IAIK-Toolkits may be
-subject to export and import restrictions. Their re-export may require
-the approval of the competent authorities. The LICENSEE shall be liable
-for the observance of any control regulation and explicitly agrees to
-hold Stiftung SIC fully harmless.
-
-11. WAIVER: Invalidity, on legal grounds, of any term of this Agreement
-does not render the Agreement as a whole invalid.
-
-12. SURVIVAL: Irrespective of expiration or termination of this
-Agreement, the provisions of Articles 2, 4, and 8 shall survive the
-termination or the expiry of this Agreement.
-
-13. GOVERNING LAW, ARBITRATION: This Agreement is governed by Austrian
-law.
-
diff --git a/pom.xml b/pom.xml
index 529b515e..48169e8c 100644
--- a/pom.xml
+++ b/pom.xml
@@ -518,7 +518,7 @@
</executions>
<configuration>
<excludedScopes>test</excludedScopes>
- <excludedGroups>iaik.*|MOA.spss.*</excludedGroups>
+ <excludedGroups>MOA.spss.*</excludedGroups>
</configuration>
</plugin>