diff options
author | tkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4> | 2013-12-13 01:57:31 +0000 |
---|---|---|
committer | tkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4> | 2013-12-13 01:57:31 +0000 |
commit | da6c49cbea9c80ad057a5fc3b698ce14ad9a7415 (patch) | |
tree | 2179084a1c0352a0a5a432de716a2778781f86bb /BKUApplet/src/main/java/at/gv | |
parent | d311d0f7b7ef9ed5bc383d6744b7d61239aafbc1 (diff) | |
download | mocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.tar.gz mocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.tar.bz2 mocca-da6c49cbea9c80ad057a5fc3b698ce14ad9a7415.zip |
Add DigestMethod to STAL SignRequest, check digest value in secure viewer
NOTE: This currently disables viewing signature data which uses the
ExcludeByteRange feature, e.g. PAdES signatures.
git-svn-id: https://joinup.ec.europa.eu/svn/mocca/trunk@1263 8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4
Diffstat (limited to 'BKUApplet/src/main/java/at/gv')
-rw-r--r-- | BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java b/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java index c6a2f72a..773bab80 100644 --- a/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java +++ b/BKUApplet/src/main/java/at/gv/egiz/bku/online/applet/AppletSecureViewer.java @@ -196,9 +196,9 @@ public class AppletSecureViewer implements SecureViewer { log.debug("Digesting reference " + signedRefId + " (" + mimeType + ";" + encoding + ")"); } - if (signedDigestAlg.startsWith("CMS:")) { - log.info("CMS signature - skip verifying hashdata for now"); - } else { +// if (signedDigestAlg.startsWith("CMS:")) { +// log.info("CMS signature - skip verifying hashdata for now"); +// } else { byte[] hashDataInputDigest = digest(hdi, signedDigestAlg); log.debug("Comparing digest to claimed digest value for reference {}.", signedRefId); @@ -206,7 +206,7 @@ public class AppletSecureViewer implements SecureViewer { log.error("Bad digest value for reference {}.", signedRefId); throw new DigestException("Bad digest value for reference " + signedRefId); } - } +// } verifiedHashDataInputs.add(new ByteArrayHashDataInput(hdi, signedRefId, mimeType, encoding, filename)); } |